|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 141 occurrences of 107 keywords
|
|
|
Results
Found 55 publication records. Showing 55 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ram Krishnan, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough |
Stale-safe security properties for group-based secure information sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 53-62, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stale attributes, information sharing, security properties |
1 | Jay A. McCarthy, Shriram Krishnamurthi |
Minimal backups of cryptographic protocol runs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 11-20, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cppl, cryptographic protocols, coq, strand spaces |
1 | John P. McDermott, Leo Freitas |
A formal security policy for xenon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 43-52, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
refinement, open-source, z, csp, hypervisor, information-flow security, circus |
1 | Ti Zhou, Mengjun Li, Zhoujun Li 0001 |
Local abstract verification and refinement of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 21-30, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
verification, refinement, abstraction, security protocols |
1 | Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Llanos Tobarra |
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 1-10, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
saml single sign-on, sat-based model checking, security protocols, bounded model checking |
1 | Vitaly Shmatikov (eds.) |
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008 ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![ACM, 978-1-60558-288-7 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
1 | Marcin Poturalski, Panagiotis Papadimitratos, Jean-Pierre Hubaux |
Towards provable secure neighbor discovery in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 31-42, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secure neighbor discovery, relay attack, wireless networks security |
1 | Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren |
Security policy analysis using deductive spreadsheets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 42-50, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SELinux policy, security policy analysis, vulnerability analysis |
1 | Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel (eds.) |
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![ACM, 978-1-59593-887-9 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Klaas Ole Kürtz, Ralf Küsters, Thomas Wilke |
Selecting theories and nonce generation for recursive protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 61-70, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security protocols, decidability, automatic analysis |
1 | Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix |
Security policy compliance with violation management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 31-40, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
labeled kripke structure, temporal logic, security policy, deontic logic, violation |
1 | Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei |
A calculus of challenges and responses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 51-60, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
static analysis, authentication protocols, process calculi |
1 | John McLean |
Formal methods in security engineering: where we've been, where we are, where we need to go. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 1, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
formal methods, computer security |
1 | Venanzio Capretta, Bernard Stepien, Amy P. Felty, Stan Matwin |
Formal correctness of conflict detection for firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 22-30, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
firewall, coq |
1 | Torben Amtoft, Anindya Banerjee 0001 |
Verification condition generation for conditional information flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 2-11, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
conditional information flow analysis, object invariants, verification condition generation |
1 | Jeff Lewis |
Cryptol: specification, implementation and verification of high-grade cryptographic applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 41, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptography, specification language, certification, high assurance, symmetric key |
1 | Glenn Bruns, Daniel S. Dantas, Michael Huth 0001 |
A simple and expressive semantic framework for policy composition in access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 12-21, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access-control policy languages, multi-valued logic, bilattices |
1 | Anderson Santana de Oliveira, Eric Ke Wang, Claude Kirchner, Hélène Kirchner |
Weaving rewrite-based access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 71-80, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
strategic rewriting, access control, aspect-oriented programming, term rewriting, execution monitoring |
1 | Silvia Crafa, Sabina Rossi |
P-congruences as non-interference for the pi-calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 13-22, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
process calculi, noninterference, downgrading |
1 | Jan Cederquist, Muhammad Torabi Dashti |
An intruder model for verifying liveness in security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 23-32, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, intruder models, security protocols, liveness properties |
1 | Marianne Winslett, Andrew D. Gordon 0001, David Sands (eds.) |
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006 ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![ACM, 1-59593-550-9 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee 0001 |
Securing the drop-box architecture for assisted living. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 1-12, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
home health monitoring, security protocol verification, formal methods, formal verification, assisted living |
1 | Geoffrey Smith 0001, Rafael Alpízar |
Secure information flow with random assignment and encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 33-44, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow |
1 | Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten |
Bridging the gap between web application firewalls and web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 67-77, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
run-time enforcement, shared data repository, web spplication girewall, static verification |
1 | Adam J. Lee, Jodie P. Boyer, Lars E. Olson 0001, Carl A. Gunter |
Defeasible security policy composition for web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 45-54, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security policy composition, web services, defeasible logic |
1 | Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert |
NETRA: : seeing through access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 55-66, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privilege escalation, vulnerability reports, static analysis |
1 | Heiko Mantel |
The framework of selective interleaving functions and the modular assembly kit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 53-62, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
formal specification and analysis of security properties, noninterference, information flow security |
1 | Michael Backes 0001, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh |
On fairness in simulatability-based cryptographic systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 13-22, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
scheduling, fairness, cryptographic protocols, simulatability |
1 | Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum |
Provable anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 63-72, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, formal methods, cryptography, anonymity, knowledge, epistemic logic, unlinkability, crowds, onion routing |
1 | Avik Chaudhuri, Martín Abadi |
Formal security analysis of basic network-attached storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 43-52, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
full abstraction, secure storage, applied pi calculus |
1 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann |
Email feedback: a policy-based approach to overcoming false positives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 73-82, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
email/spam control, policy advertisement, policy feedback, constraint logic programming |
1 | Prateek Gupta, Vitaly Shmatikov |
Towards computationally sound symbolic analysis of key exchange protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 23-32, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
protocol logic, cryptographic protocols, symbolic analysis, computational soundness |
1 | Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell (eds.) |
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![ACM, 1-59593-231-3 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang |
Risk assessment in distributed authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 33-42, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
1 | Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 |
A rewriting-based inference system for the NRL protocol analyzer: grammar generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 1-12, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
formal methods, protocol verification, rewriting logic |
1 | Lingyu Wang 0001, Duminda Wijesekera, Sushil Jajodia |
A logic-based framework for attribute based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 45-55, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
constrained logic programming with sets, attribute based access control |
1 | Tomás E. Uribe, Steven Cheung |
Automatic analysis of firewall and network intrusion detection system configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 66-74, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
formal specification and analysis, network configuration and security, firewalls, network intrusion detection |
1 | Vijayalakshmi Atluri, Michael Backes 0001, David A. Basin, Michael Waidner (eds.) |
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004 ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![ACM, 1-58113-971-3 The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
1 | Phan Minh Dung, Phan Minh Thang |
Stepwise development of security protocols: a speech act-oriented approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 33-44, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security protocols, cryptographic protocols |
1 | Michele Bugliesi, Riccardo Focardi, Matteo Maffei |
Authenticity by tagging and typing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 1-12, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, static analysis, process calculi |
1 | Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader |
Timed model checking of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 23-32, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
timed model checking, security protocols, timed automata |
1 | Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl |
MAC and UML for secure software design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 75-85, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, UML, software design, mandatory access control |
1 | Brant Hashii |
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 86-95, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multilevel security (MLS), formal specification, network security, alloy, high assurance |
1 | Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev |
Synthesising verified access control systems in XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 56-65, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control policy language, XACML, access control model |
1 | Gilles Barthe, Leonor Prensa Nieto |
Formally verifying information flow type systems for concurrent and thread systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 13-22, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
machine-checked proofs, concurrency, noninterference |
1 | François Siewe, Antonio Cau, Hussein Zedan |
A compositional framework for access control policies enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 32-42, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, authorization, delegation, policy composition |
1 | Manuel Koch, Francesco Parisi-Presicce |
Formal access control analysis in the software development process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 67-76, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, methodology, graph transformation systems |
1 | Mohamed Hamdi, Noureddine Boudriga |
Algebraic specification of network security risk management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 52-60, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
formal specifications, risk management, algebraic modeling |
1 | Khaled Alghathbar, Duminda Wijesekera |
authUML: a three-phased framework to analyze access control specifications in use cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 77-86, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
semi-formal methods, use cases, Security engineering, access control policies |
1 | Michael Backes 0001, David A. Basin (eds.) |
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003 ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![ACM, 1-58113-781-8 The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
1 | Sviatoslav B. Braynov, Murtuza Jadliwala |
Representation and analysis of coordinated attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 43-51, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
attack plan, coordinated attack, model checking, attack graph, adversary modelling |
1 | Michael R. Hansen, Robin Sharp |
Using interval logics for temporal analysis of security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 24-31, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
verification, real-time, security protocols, interval logic |
1 | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic |
Secure protocol composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 11-23, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
logic, security protocols, invariants, protocol composition |
1 | Hongbin Zhou, Simon N. Foley |
Fast automatic synthesis of security protocols using backward search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 1-10, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
backward search, security protocols, automatic generation, belief logic |
1 | Michael Backes 0001, Catherine Meadows 0001, John C. Mitchell |
Relating cryptography and formal methods: a panel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 61-66, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
formal methods, cryptography, security protocols |
Displaying result #1 - #55 of 55 (100 per page; Change: )
|
|