The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FMSE"( http://dblp.L3S.de/Venues/FMSE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ccs

Publication years (Num. hits)
2003-2004 (20) 2005-2006 (17) 2007-2008 (18)
Publication types (Num. hits)
inproceedings(49) proceedings(6)
Venues (Conferences, Journals, ...)
FMSE(55)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 141 occurrences of 107 keywords

Results
Found 55 publication records. Showing 55 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ram Krishnan, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough Stale-safe security properties for group-based secure information sharing. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stale attributes, information sharing, security properties
1Jay A. McCarthy, Shriram Krishnamurthi Minimal backups of cryptographic protocol runs. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cppl, cryptographic protocols, coq, strand spaces
1John P. McDermott, Leo Freitas A formal security policy for xenon. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF refinement, open-source, z, csp, hypervisor, information-flow security, circus
1Ti Zhou, Mengjun Li, Zhoujun Li 0001 Local abstract verification and refinement of security protocols. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verification, refinement, abstraction, security protocols
1Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Llanos Tobarra Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF saml single sign-on, sat-based model checking, security protocols, bounded model checking
1Vitaly Shmatikov (eds.) Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008 Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  BibTeX  RDF
1Marcin Poturalski, Panagiotis Papadimitratos, Jean-Pierre Hubaux Towards provable secure neighbor discovery in wireless networks. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure neighbor discovery, relay attack, wireless networks security
1Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren Security policy analysis using deductive spreadsheets. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SELinux policy, security policy analysis, vulnerability analysis
1Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel (eds.) Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  BibTeX  RDF
1Klaas Ole Kürtz, Ralf Küsters, Thomas Wilke Selecting theories and nonce generation for recursive protocols. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security protocols, decidability, automatic analysis
1Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix Security policy compliance with violation management. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF labeled kripke structure, temporal logic, security policy, deontic logic, violation
1Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei A calculus of challenges and responses. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF static analysis, authentication protocols, process calculi
1John McLean Formal methods in security engineering: where we've been, where we are, where we need to go. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF formal methods, computer security
1Venanzio Capretta, Bernard Stepien, Amy P. Felty, Stan Matwin Formal correctness of conflict detection for firewalls. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF firewall, coq
1Torben Amtoft, Anindya Banerjee 0001 Verification condition generation for conditional information flow. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF conditional information flow analysis, object invariants, verification condition generation
1Jeff Lewis Cryptol: specification, implementation and verification of high-grade cryptographic applications. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, specification language, certification, high assurance, symmetric key
1Glenn Bruns, Daniel S. Dantas, Michael Huth 0001 A simple and expressive semantic framework for policy composition in access control. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access-control policy languages, multi-valued logic, bilattices
1Anderson Santana de Oliveira, Eric Ke Wang, Claude Kirchner, Hélène Kirchner Weaving rewrite-based access control policies. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF strategic rewriting, access control, aspect-oriented programming, term rewriting, execution monitoring
1Silvia Crafa, Sabina Rossi P-congruences as non-interference for the pi-calculus. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF process calculi, noninterference, downgrading
1Jan Cederquist, Muhammad Torabi Dashti An intruder model for verifying liveness in security protocols. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Dolev-Yao intruder, intruder models, security protocols, liveness properties
1Marianne Winslett, Andrew D. Gordon 0001, David Sands (eds.) Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006 Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  BibTeX  RDF
1Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee 0001 Securing the drop-box architecture for assisted living. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF home health monitoring, security protocol verification, formal methods, formal verification, assisted living
1Geoffrey Smith 0001, Rafael Alpízar Secure information flow with random assignment and encryption. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow
1Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten Bridging the gap between web application firewalls and web applications. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF run-time enforcement, shared data repository, web spplication girewall, static verification
1Adam J. Lee, Jodie P. Boyer, Lars E. Olson 0001, Carl A. Gunter Defeasible security policy composition for web services. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security policy composition, web services, defeasible logic
1Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert NETRA: : seeing through access control. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privilege escalation, vulnerability reports, static analysis
1Heiko Mantel The framework of selective interleaving functions and the modular assembly kit. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF formal specification and analysis of security properties, noninterference, information flow security
1Michael Backes 0001, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh On fairness in simulatability-based cryptographic systems. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF scheduling, fairness, cryptographic protocols, simulatability
1Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum Provable anonymity. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, formal methods, cryptography, anonymity, knowledge, epistemic logic, unlinkability, crowds, onion routing
1Avik Chaudhuri, Martín Abadi Formal security analysis of basic network-attached storage. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF full abstraction, secure storage, applied pi calculus
1Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann Email feedback: a policy-based approach to overcoming false positives. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF email/spam control, policy advertisement, policy feedback, constraint logic programming
1Prateek Gupta, Vitaly Shmatikov Towards computationally sound symbolic analysis of key exchange protocols. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF protocol logic, cryptographic protocols, symbolic analysis, computational soundness
1Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell (eds.) Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  BibTeX  RDF
1Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang Risk assessment in distributed authorization. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF trust management logic, distributed authorization
1Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 A rewriting-based inference system for the NRL protocol analyzer: grammar generation. Search on Bibsonomy FMSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF formal methods, protocol verification, rewriting logic
1Lingyu Wang 0001, Duminda Wijesekera, Sushil Jajodia A logic-based framework for attribute based access control. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF constrained logic programming with sets, attribute based access control
1Tomás E. Uribe, Steven Cheung Automatic analysis of firewall and network intrusion detection system configurations. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF formal specification and analysis, network configuration and security, firewalls, network intrusion detection
1Vijayalakshmi Atluri, Michael Backes 0001, David A. Basin, Michael Waidner (eds.) Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004 Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  BibTeX  RDF
1Phan Minh Dung, Phan Minh Thang Stepwise development of security protocols: a speech act-oriented approach. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security protocols, cryptographic protocols
1Michele Bugliesi, Riccardo Focardi, Matteo Maffei Authenticity by tagging and typing. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, static analysis, process calculi
1Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader Timed model checking of security protocols. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF timed model checking, security protocols, timed automata
1Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl MAC and UML for secure software design. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, UML, software design, mandatory access control
1Brant Hashii Lessons learned using alloy to formally specify MLS-PCA trusted security architecture. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multilevel security (MLS), formal specification, network security, alloy, high assurance
1Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev Synthesising verified access control systems in XACML. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control policy language, XACML, access control model
1Gilles Barthe, Leonor Prensa Nieto Formally verifying information flow type systems for concurrent and thread systems. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF machine-checked proofs, concurrency, noninterference
1François Siewe, Antonio Cau, Hussein Zedan A compositional framework for access control policies enforcement. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, authorization, delegation, policy composition
1Manuel Koch, Francesco Parisi-Presicce Formal access control analysis in the software development process. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, methodology, graph transformation systems
1Mohamed Hamdi, Noureddine Boudriga Algebraic specification of network security risk management. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal specifications, risk management, algebraic modeling
1Khaled Alghathbar, Duminda Wijesekera authUML: a three-phased framework to analyze access control specifications in use cases. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF semi-formal methods, use cases, Security engineering, access control policies
1Michael Backes 0001, David A. Basin (eds.) Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003 Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  BibTeX  RDF
1Sviatoslav B. Braynov, Murtuza Jadliwala Representation and analysis of coordinated attacks. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack plan, coordinated attack, model checking, attack graph, adversary modelling
1Michael R. Hansen, Robin Sharp Using interval logics for temporal analysis of security protocols. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF verification, real-time, security protocols, interval logic
1Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic Secure protocol composition. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF logic, security protocols, invariants, protocol composition
1Hongbin Zhou, Simon N. Foley Fast automatic synthesis of security protocols using backward search. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF backward search, security protocols, automatic generation, belief logic
1Michael Backes 0001, Catherine Meadows 0001, John C. Mitchell Relating cryptography and formal methods: a panel. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal methods, cryptography, security protocols
Displaying result #1 - #55 of 55 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license