Sciweavers

ACISP
2001
Springer
14 years 4 days ago
Improving the Availability of Time-Stamping Services
We discuss the availability questions that arise when digital time stamps are used for preserving the evidentiary value of electronic documents. We analyze the time-stamping protoc...
Arne Ansper, Ahto Buldas, Märt Saarepera, Jan...
CSFW
2002
IEEE
14 years 18 days ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov
CSFW
2002
IEEE
14 years 18 days ago
A Logic for Reasoning about Digital Rights
Riccardo Pucella, Vicky Weissman
CSFW
2002
IEEE
14 years 18 days ago
Formal Specification of Intrusion Signatures and Detection Rules
Jean-Philippe Pouzol, Mireille Ducassé
CSFW
2002
IEEE
14 years 18 days ago
Quantifying Information Flow
We extend definitions of information flow so as to quantify the amount of information passed; in other words, we give a formal definition of the capacity of covert channels. Ou...
Gavin Lowe
CSFW
2002
IEEE
14 years 18 days ago
A Privacy Policy Model for Enterprises
Privacy is an increasing concern in the marketplace. Although enterprises promise sound privacy practices to their customers, there is no technical mechanism to enforce them inter...
Günter Karjoth, Matthias Schunter
CSFW
2002
IEEE
14 years 18 days ago
Strand Spaces and Rank Functions: More than Distant Cousins
The strand spaces model and the rank functions model have both been used successfully to analyse and verify security protocols running on unbounded networks. At first sight, thes...
James Heather
CSFW
2002
IEEE
14 years 18 days ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
CSFW
2002
IEEE
14 years 18 days ago
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the in...
Frederick Butler, Iliano Cervesato, Aaron D. Jagga...