Type systems for authorization are a popular device for the specification and verification of security properties in cryptographic applications. Though promising, existing frameworks exhibit limited expressive power, as the underlying specification languages fail to account for powerful notions of authorization based on access counts, usage bounds, and mechanisms of resource consumption, which instead characterize most of the modern online services and applications. We present a new type system that features a novel combination of affine logic, refinement types, and types for cryptography, to support the cerification of resource aware security policies. The type system allows us to analyze a number of cryptographic protocol patterns and s...
We propose a type and effect system for authentication protocols built upon a tagging scheme that f...
This paper contrasts two existing type-based techniques for the analysis of authentication protocols...
We present a large class of security protocol abstractions with the aim of improving the scope and e...
Type systems for authorization are a popular device for the specification and verification of securi...
Refinement type systems have proved very effective for security policy verification in distributed a...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Abstract. Distributed systems and applications are often expected to enforce high-level authorizatio...
We present a new type system for verifying the security of reference implementa-tions of cryptograph...
Distributed systems and applications are often expected to enforce high-level authorization policie...
International audienceType systems are effective tools for verifying the security of cryptographic p...
International audienceWe present the design and implementation of a typechecker for verifying securi...
We present the design and implementation of a typechecker for verifying security properties of the s...
We propose a type and effect system for authentication protocols built upon a tagging scheme that fo...
We propose a type and effect system for authentication protocols built upon a tagging scheme that f...
This paper contrasts two existing type-based techniques for the analysis of authentication protocols...
We present a large class of security protocol abstractions with the aim of improving the scope and e...
Type systems for authorization are a popular device for the specification and verification of securi...
Refinement type systems have proved very effective for security policy verification in distributed a...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Abstract. Distributed systems and applications are often expected to enforce high-level authorizatio...
We present a new type system for verifying the security of reference implementa-tions of cryptograph...
Distributed systems and applications are often expected to enforce high-level authorization policie...
International audienceType systems are effective tools for verifying the security of cryptographic p...
International audienceWe present the design and implementation of a typechecker for verifying securi...
We present the design and implementation of a typechecker for verifying security properties of the s...
We propose a type and effect system for authentication protocols built upon a tagging scheme that fo...
We propose a type and effect system for authentication protocols built upon a tagging scheme that f...
This paper contrasts two existing type-based techniques for the analysis of authentication protocols...
We present a large class of security protocol abstractions with the aim of improving the scope and e...