A temporal authorization model
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A discretionary access control model with temporal authorizations
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
Enriching the Expressive Power of Security Labels
IEEE Transactions on Knowledge and Data Engineering
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Garbage Collector Memory Accounting in Language-Based Systems
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A security model of dynamic labeling providing a tiered approach to verification
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Hi-index | 0.00 |
We give a formal model of protocol security. Our model allows us to reason about the security of protocols, and considers issues of beliefs of agents, time, and secrecy. We prove a composition theorem which allows us to state sufficient conditions on ...