Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques to develop powerful type systems for the verification of a wide range of security properties on application code. Although successful in many respects, these type systems fall short of capturing resource-conscious properties that are crucial in large classes of modern distributed applications. In this article, we propose the first type system that statically enforces the safety of cryptographic protocol implementations with respect to authorization policies expressed in affine logic. Our type system draws on a novel notion of "exponential serialization" of affine formulas, a general technique to protect affine formulas from the effect of dup...
We present a new type system for verifying the security of reference implementa-tions of cryptograph...
A distributed proof system is an effective way for deriving useful information by combining data fro...
We present a large class of security protocol abstractions with the aim of improving the scope and e...
Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Refinement type systems have proved very effective for security policy verification in distributed a...
Type systems for authorization are a popular device for the specification and verification of securi...
Related Projects * F*: A Verifying ML Compiler for Distributed ProgrammingInternational audienceDist...
We present the design and implementation of a typechecker for verifying security properties of the s...
Abstract. Distributed systems and applications are often expected to enforce high-level authorizatio...
International audienceDistributed applications are difficult to program reliably and securely. Depen...
Distributed systems and applications are often expected to enforce high-level authorization policie...
The -calculus is a process calculus in which we can compositionally represent dynamics of major prog...
We advocate here the use of two authentication primitives we recently propose in a calculus for dist...
We present a new type system for verifying the security of reference implementa-tions of cryptograph...
A distributed proof system is an effective way for deriving useful information by combining data fro...
We present a large class of security protocol abstractions with the aim of improving the scope and e...
Recent research has shown that it is possible to leverage general-purpose theorem-proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Recent research has shown that it is possible to leverage general-purpose theorem proving techniques...
Refinement type systems have proved very effective for security policy verification in distributed a...
Type systems for authorization are a popular device for the specification and verification of securi...
Related Projects * F*: A Verifying ML Compiler for Distributed ProgrammingInternational audienceDist...
We present the design and implementation of a typechecker for verifying security properties of the s...
Abstract. Distributed systems and applications are often expected to enforce high-level authorizatio...
International audienceDistributed applications are difficult to program reliably and securely. Depen...
Distributed systems and applications are often expected to enforce high-level authorization policie...
The -calculus is a process calculus in which we can compositionally represent dynamics of major prog...
We advocate here the use of two authentication primitives we recently propose in a calculus for dist...
We present a new type system for verifying the security of reference implementa-tions of cryptograph...
A distributed proof system is an effective way for deriving useful information by combining data fro...
We present a large class of security protocol abstractions with the aim of improving the scope and e...