Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Scyther: Semantics and verification of security protocols
CJF Cremers - 2006 - research.tue.nl
Recent technologies have cleared the way for large scale application of electronic
communication. The open and distributed nature of these communications implies that the …
communication. The open and distributed nature of these communications implies that the …
Refinement types for secure implementations
We present the design and implementation of a typechecker for verifying security properties
of the source code of cryptographic protocols and access control mechanisms. The …
of the source code of cryptographic protocols and access control mechanisms. The …
Towards a theory of accountability and audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means
to enforce authorization policies. In this paper, we describe an operational model of …
to enforce authorization policies. In this paper, we describe an operational model of …
Aura: A programming language for authorization and audit
This paper presents AURA, a programming language for access control that treats ordinary
programming constructs (eg, integers and recursive functions) and authorization logic …
programming constructs (eg, integers and recursive functions) and authorization logic …
A type discipline for authorization in distributed systems
We consider the problem of statically verifying the conformance of the code of a system to an
explicit authorization policy. In a distributed setting, some part of the system may be …
explicit authorization policy. In a distributed setting, some part of the system may be …
Evidence-based audit
Authorization logics provide a principled and flexible approach to specifying access control
policies. One of their compelling benefits is that a proof in the logic is evidence that an …
policies. One of their compelling benefits is that a proof in the logic is evidence that an …
A logic of reachable patterns in linked data-structures
We define a new decidable logic for expressing and checking invariants of programs that
manipulate dynamically-allocated objects via pointers and destructive pointer updates. The …
manipulate dynamically-allocated objects via pointers and destructive pointer updates. The …
Type-checking zero-knowledge
This paper presents the first type system for statically analyzing security protocols that are
based on zero-knowledge proofs. We show how certain properties offered by zero …
based on zero-knowledge proofs. We show how certain properties offered by zero …
Robustly safe compilation
Secure compilers generate compiled code that withstands many target-level attacks such as
alteration of control flow, data leaks or memory corruption. Many existing secure compilers …
alteration of control flow, data leaks or memory corruption. Many existing secure compilers …
A type discipline for authorization policies
Distributed systems and applications are often expected to enforce high-level authorization
policies. To this end, the code for these systems relies on lower-level security mechanisms …
policies. To this end, the code for these systems relies on lower-level security mechanisms …