Trust without control is a precarious solution to human nature. This belief has lead to many ways for guaranteeing secure software such as statically analyzing programs to check that they comply to the intended specifications which results in software certification. One problem with this approach is that the current systems can only accept all or nothing without knowing what the software is doing. Another way to complement is by run-time monitoring such that programs are checked during execution that they comply to security policy defined by the systems. The problem with this approach is the significant overhead which may not be desirable for some applications. This thesis describes a formalism, called Automata Modulo Theory, that allows...
A precise characterization is given for the class of security policies that can be enforced using me...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
Nowadays emerging paradigms are being adopted by several companies, where applications are built by ...
The traditional realm of formal methods is the off-line verification of formal properties of hardwar...
The traditional realm of formal methods is the off-line verification of formal properties of hardware...
The traditional realm of formal methods is the off-line verification of formal properties of hardware ...
Model-carrying code and security-by-contract have proposed to augment mobile code with a claim on it...
Security and trust represent two different perspectives on the problem of guaranteeing the correct i...
AbstractWe define a set of process algebra operators, that we call controller operators, able to mim...
AbstractSecurity and trust represent two different perspectives on the problem of guaranteeing the c...
Edit automata have been introduced by J.Ligatti et al. as a model for security enforcement mechanism...
Edit automata have been introduced by J. Ligatti et al. as a model for security enforcement mechanis...
Certi ed code is a general mechanism for enforcing se-curity properties. In this paradigm, untrusted...
Conditional security assesses the security of an information and communication system in a specif...
We show how cryptographic protocols using Di#e-Hellman primitives, i.e., modular exponentiation on a...
A precise characterization is given for the class of security policies that can be enforced using me...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
Nowadays emerging paradigms are being adopted by several companies, where applications are built by ...
The traditional realm of formal methods is the off-line verification of formal properties of hardwar...
The traditional realm of formal methods is the off-line verification of formal properties of hardware...
The traditional realm of formal methods is the off-line verification of formal properties of hardware ...
Model-carrying code and security-by-contract have proposed to augment mobile code with a claim on it...
Security and trust represent two different perspectives on the problem of guaranteeing the correct i...
AbstractWe define a set of process algebra operators, that we call controller operators, able to mim...
AbstractSecurity and trust represent two different perspectives on the problem of guaranteeing the c...
Edit automata have been introduced by J.Ligatti et al. as a model for security enforcement mechanism...
Edit automata have been introduced by J. Ligatti et al. as a model for security enforcement mechanis...
Certi ed code is a general mechanism for enforcing se-curity properties. In this paradigm, untrusted...
Conditional security assesses the security of an information and communication system in a specif...
We show how cryptographic protocols using Di#e-Hellman primitives, i.e., modular exponentiation on a...
A precise characterization is given for the class of security policies that can be enforced using me...
Abstract. Formal methods have been very successful in analyzing security pro-tocols for reachability...
Nowadays emerging paradigms are being adopted by several companies, where applications are built by ...