Language-based information-flow security
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
[BOOK][B] Individual freedom in language teaching
C Brumfit - 2013 - books.google.com
The book draws upon linguistic, psychological, philosophical, and sociolinguistic principles
and uses practical examples from second, foreign, and mother tongue teaching. It attempts …
and uses practical examples from second, foreign, and mother tongue teaching. It attempts …
Static validation of security protocols
C Bodei, M Buchholtz, P Degano… - Journal of …, 2005 - content.iospress.com
We methodically expand protocol narrations into terms of a process algebra in order to
specify some of the checks that need to be made in a protocol. We then apply static analysis …
specify some of the checks that need to be made in a protocol. We then apply static analysis …
Fine-grained information flow analysis and enforcement in a java virtual machine
D Chandra, M Franz - Twenty-Third Annual Computer Security …, 2007 - ieeexplore.ieee.org
We have implemented an information flow framework for the Java virtual machine that
combines static and dynamic techniques to capture not only explicit flows, but also implicit …
combines static and dynamic techniques to capture not only explicit flows, but also implicit …
Automatic validation of protocol narration
C Bodei, M Buchholtz, P Degano… - 16th IEEE Computer …, 2003 - ieeexplore.ieee.org
We perform a systematic expansion of protocol narrations into terms of process algebra in
order to make precise some of the detailed checks that need to be made in a protocol. We …
order to make precise some of the detailed checks that need to be made in a protocol. We …
Flow Logic: a multi-paradigmatic approach to static analysis
Flow logic is an approach to static analysis that separates the specification of when an
analysis estimate is acceptable for a program from the actual computation of the analysis …
analysis estimate is acceptable for a program from the actual computation of the analysis …
Abstracting IoT protocols using timed process algebra and SPIN model checker
The advancement of the Internet of Things (IoT) has tremendously influenced many fields of
human life. The Internet of Medical Things, Internet of Flying Things, Internet of Floating …
human life. The Internet of Medical Things, Internet of Flying Things, Internet of Floating …
Tracing where IoT data are collected and aggregated
C Bodei, P Degano, GL Ferrari… - Logical Methods in …, 2017 - lmcs.episciences.org
The Internet of Things (IoT) offers the infrastructure of the information society. It hosts smart
objects that automatically collect and exchange data of various kinds, directly gathered from …
objects that automatically collect and exchange data of various kinds, directly gathered from …
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations
We present a new type system for verifying the security of reference implementations of
cryptographic protocols written in a core functional programming language. The type system …
cryptographic protocols written in a core functional programming language. The type system …
Analysis of security protocols as open systems
F Martinelli - Theoretical Computer Science, 2003 - Elsevier
We propose a methodology for the formal analysis of security protocols. This originates from
the observation that the verification of security protocols can be conveniently treated as the …
the observation that the verification of security protocols can be conveniently treated as the …