Wolthusen, Stephen
This paper summarizes existing and describes ongoing work on security policy definition and particularly enforcement in heterogeneous distributed systems. Based on a formal model of operating systems and interactions among networked nodes in a distributed system axiomatizing relations among and abstractions in distributed systems, arbitrary securit...
Wolthusen, S.
Vernetzung ist eine zwingende Voraussetzung für die Mehrzahl elektronisch unterstützter Geschäftsprozesse und stellt zudem einen maßgeblichen Faktor für Effizienzgewinne dieser Prozesse dar. Der Begriff der Netzwerksicherheit muß daher auf zwei Arten betrachtet werden: Einerseits als Schutz vor Bedrohungen, die durch Vernetzung für einzelne IT-Syst...
Chevalier, Yannick Compagna, Luca Cuellar, Jorge Hankes Drielsma, Paul Mantovani, Jacopo Moedersheim, Sebastian Vigneron, Laurent
This paper presents HLPSL, a high level protocol specification language for the modelling of security-sensitive cryptographic protocols. This language enjoys a formal semantics based on Lamport's Temporal Logic of Actions. HLPSL is modular and allows for the specification of control flow patterns, data-structures, alternative intruder models, and c...
Chevalier, Yannick Compagna, Luca Cuellar, Jorge Hankes Drielsma, Paul Mantovani, Jacopo Moedersheim, Sebastian Vigneron, Laurent
This paper presents HLPSL, a high level protocol specification language for the modelling of security-sensitive cryptographic protocols. This language enjoys a formal semantics based on Lamport's Temporal Logic of Actions. HLPSL is modular and allows for the specification of control flow patterns, data-structures, alternative intruder models, and c...
Subramanian, L. Roth, V. Stoica, I. Shenker, S. Katz, R.H.
BGP, the current inter-domain routing protocol, assumes that the routing information propagated by authenticated routers is correct. This assumption renders the current infrastructure vulnerable to both accidental misconfigurations and deliberate attacks. To reduce this vulnerability, we present a combination of two mechanisms: Listen and Whisper. ...
MICHIARDI, Pietro MOLVA, Refik
PARIS-Télécom ParisTech (751132302) / Sudoc / Sudoc / France / FR
Rivest, Ronald
6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer syst...
Uluöz, Hakan
Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2003 / Thesis (M.Sc.) -- İstanbul Technical University, Institute of Science and Technology, 2003 / Bu çalışmada, akıllıkart teknolojisi kullanılarak, yerel ağlar üzerinde güvenli mesajlaşmaya imkan veren bir sistem tasarlanmıştır. Akıllıkartlar, çeşitli güvenlik uygulama...
Gao, Qingshi Hu, Yue Li, Lei Chen, Xu Liu, Honglan
Published in
Journal of Computer Science and Technology
In today's Internet computing world, illegal activities by crackers pose a serious threat to computer security. It is well known that computer viruses, Trojan horses and other intrusive programs may cause severe and often catastrophic consequences. This paper proposes a novel secure computer architecture based on security-code. Every instruction/da...
Fokine, Klas
This thesis covers the issue of securing ad hoc networks. Such networks exhibit a number of characteristics that make such a task challenging. One of the major challenges is that ad hoc networks typically lack a fixed infrastructure both in form of physical infrastructure such as routers, servers and stable communication links and in the form of an...