|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 141 occurrences of 107 keywords
|
|
|
Results
Found 55 publication records. Showing 55 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ram Krishnan, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough |
Stale-safe security properties for group-based secure information sharing. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
stale attributes, information sharing, security properties |
1 | Jay A. McCarthy, Shriram Krishnamurthi |
Minimal backups of cryptographic protocol runs. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
cppl, cryptographic protocols, coq, strand spaces |
1 | John P. McDermott, Leo Freitas |
A formal security policy for xenon. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
refinement, open-source, z, csp, hypervisor, information-flow security, circus |
1 | Ti Zhou, Mengjun Li, Zhoujun Li 0001 |
Local abstract verification and refinement of security protocols. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
verification, refinement, abstraction, security protocols |
1 | Alessandro Armando, Roberto Carbone, Luca Compagna, Jorge Cuéllar, Llanos Tobarra |
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
saml single sign-on, sat-based model checking, security protocols, bounded model checking |
1 | Vitaly Shmatikov (eds.) |
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008 |
FMSE |
2008 |
DBLP BibTeX RDF |
|
1 | Marcin Poturalski, Panagiotis Papadimitratos, Jean-Pierre Hubaux |
Towards provable secure neighbor discovery in wireless networks. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
secure neighbor discovery, relay attack, wireless networks security |
1 | Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren |
Security policy analysis using deductive spreadsheets. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
SELinux policy, security policy analysis, vulnerability analysis |
1 | Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel (eds.) |
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 |
FMSE |
2007 |
DBLP BibTeX RDF |
|
1 | Klaas Ole Kürtz, Ralf Küsters, Thomas Wilke |
Selecting theories and nonce generation for recursive protocols. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
security protocols, decidability, automatic analysis |
1 | Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix |
Security policy compliance with violation management. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
labeled kripke structure, temporal logic, security policy, deontic logic, violation |
1 | Michael Backes 0001, Agostino Cortesi, Riccardo Focardi, Matteo Maffei |
A calculus of challenges and responses. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
static analysis, authentication protocols, process calculi |
1 | John McLean |
Formal methods in security engineering: where we've been, where we are, where we need to go. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
formal methods, computer security |
1 | Venanzio Capretta, Bernard Stepien, Amy P. Felty, Stan Matwin |
Formal correctness of conflict detection for firewalls. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
firewall, coq |
1 | Torben Amtoft, Anindya Banerjee 0001 |
Verification condition generation for conditional information flow. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
conditional information flow analysis, object invariants, verification condition generation |
1 | Jeff Lewis |
Cryptol: specification, implementation and verification of high-grade cryptographic applications. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
cryptography, specification language, certification, high assurance, symmetric key |
1 | Glenn Bruns, Daniel S. Dantas, Michael Huth 0001 |
A simple and expressive semantic framework for policy composition in access control. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
access-control policy languages, multi-valued logic, bilattices |
1 | Anderson Santana de Oliveira, Eric Ke Wang, Claude Kirchner, Hélène Kirchner |
Weaving rewrite-based access control policies. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
strategic rewriting, access control, aspect-oriented programming, term rewriting, execution monitoring |
1 | Silvia Crafa, Sabina Rossi |
P-congruences as non-interference for the pi-calculus. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
process calculi, noninterference, downgrading |
1 | Jan Cederquist, Muhammad Torabi Dashti |
An intruder model for verifying liveness in security protocols. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, intruder models, security protocols, liveness properties |
1 | Marianne Winslett, Andrew D. Gordon 0001, David Sands (eds.) |
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006 |
FMSE |
2006 |
DBLP BibTeX RDF |
|
1 | Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee 0001 |
Securing the drop-box architecture for assisted living. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
home health monitoring, security protocol verification, formal methods, formal verification, assisted living |
1 | Geoffrey Smith 0001, Rafael Alpízar |
Secure information flow with random assignment and encryption. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow |
1 | Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten |
Bridging the gap between web application firewalls and web applications. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
run-time enforcement, shared data repository, web spplication girewall, static verification |
1 | Adam J. Lee, Jodie P. Boyer, Lars E. Olson 0001, Carl A. Gunter |
Defeasible security policy composition for web services. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
security policy composition, web services, defeasible logic |
1 | Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert |
NETRA: : seeing through access control. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
privilege escalation, vulnerability reports, static analysis |
1 | Heiko Mantel |
The framework of selective interleaving functions and the modular assembly kit. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
formal specification and analysis of security properties, noninterference, information flow security |
1 | Michael Backes 0001, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh |
On fairness in simulatability-based cryptographic systems. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
scheduling, fairness, cryptographic protocols, simulatability |
1 | Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Peter van Rossum |
Provable anonymity. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
privacy, formal methods, cryptography, anonymity, knowledge, epistemic logic, unlinkability, crowds, onion routing |
1 | Avik Chaudhuri, Martín Abadi |
Formal security analysis of basic network-attached storage. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
full abstraction, secure storage, applied pi calculus |
1 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann |
Email feedback: a policy-based approach to overcoming false positives. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
email/spam control, policy advertisement, policy feedback, constraint logic programming |
1 | Prateek Gupta, Vitaly Shmatikov |
Towards computationally sound symbolic analysis of key exchange protocols. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
protocol logic, cryptographic protocols, symbolic analysis, computational soundness |
1 | Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell (eds.) |
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 |
FMSE |
2005 |
DBLP BibTeX RDF |
|
1 | Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang |
Risk assessment in distributed authorization. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
1 | Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 |
A rewriting-based inference system for the NRL protocol analyzer: grammar generation. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
formal methods, protocol verification, rewriting logic |
1 | Lingyu Wang 0001, Duminda Wijesekera, Sushil Jajodia |
A logic-based framework for attribute based access control. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
constrained logic programming with sets, attribute based access control |
1 | Tomás E. Uribe, Steven Cheung |
Automatic analysis of firewall and network intrusion detection system configurations. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
formal specification and analysis, network configuration and security, firewalls, network intrusion detection |
1 | Vijayalakshmi Atluri, Michael Backes 0001, David A. Basin, Michael Waidner (eds.) |
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004 |
FMSE |
2004 |
DBLP BibTeX RDF |
|
1 | Phan Minh Dung, Phan Minh Thang |
Stepwise development of security protocols: a speech act-oriented approach. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
security protocols, cryptographic protocols |
1 | Michele Bugliesi, Riccardo Focardi, Matteo Maffei |
Authenticity by tagging and typing. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
authentication, static analysis, process calculi |
1 | Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader |
Timed model checking of security protocols. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
timed model checking, security protocols, timed automata |
1 | Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl |
MAC and UML for secure software design. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
security, UML, software design, mandatory access control |
1 | Brant Hashii |
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
multilevel security (MLS), formal specification, network security, alloy, high assurance |
1 | Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev |
Synthesising verified access control systems in XACML. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
access control policy language, XACML, access control model |
1 | Gilles Barthe, Leonor Prensa Nieto |
Formally verifying information flow type systems for concurrent and thread systems. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
machine-checked proofs, concurrency, noninterference |
1 | François Siewe, Antonio Cau, Hussein Zedan |
A compositional framework for access control policies enforcement. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
access control, authorization, delegation, policy composition |
1 | Manuel Koch, Francesco Parisi-Presicce |
Formal access control analysis in the software development process. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
access control, methodology, graph transformation systems |
1 | Mohamed Hamdi, Noureddine Boudriga |
Algebraic specification of network security risk management. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
formal specifications, risk management, algebraic modeling |
1 | Khaled Alghathbar, Duminda Wijesekera |
authUML: a three-phased framework to analyze access control specifications in use cases. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
semi-formal methods, use cases, Security engineering, access control policies |
1 | Michael Backes 0001, David A. Basin (eds.) |
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003 |
FMSE |
2003 |
DBLP BibTeX RDF |
|
1 | Sviatoslav B. Braynov, Murtuza Jadliwala |
Representation and analysis of coordinated attacks. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
attack plan, coordinated attack, model checking, attack graph, adversary modelling |
1 | Michael R. Hansen, Robin Sharp |
Using interval logics for temporal analysis of security protocols. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
verification, real-time, security protocols, interval logic |
1 | Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic |
Secure protocol composition. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
logic, security protocols, invariants, protocol composition |
1 | Hongbin Zhou, Simon N. Foley |
Fast automatic synthesis of security protocols using backward search. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
backward search, security protocols, automatic generation, belief logic |
1 | Michael Backes 0001, Catherine Meadows 0001, John C. Mitchell |
Relating cryptography and formal methods: a panel. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
formal methods, cryptography, security protocols |
Displaying result #1 - #55 of 55 (100 per page; Change: )
|
|