scispace - formally typeset
BookDOI

Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security

Alessandro Armando, +1 more
- 01 Jan 2010 - 
- Vol. 6186
About
This article is published in Lecture Notes in Computer Science.The article was published on 2010-01-01. It has received 26 citations till now. The article focuses on the topics: Computer security model & Software security assurance.

read more

Citations
More filters
Posted Content

A Framework for the Cryptographic Verification of Java-like Programs.

TL;DR: In this article, the authors consider the problem of establishing computational indistinguishability for Java or Java-like programs that use cryptography and propose a general framework that enables existing program analysis tools that can check (standard) non-interference properties of Java programs to establish cryptographic security guarantees, even if the tools a priori cannot deal with cryptography.
Proceedings ArticleDOI

Declarative Policies for Capability Control

TL;DR: This work introduces two independently useful semantic security policies to regulate capabilities and describes language-based mechanisms that enforce them and how programmers can dynamically and soundly combine components that enforce access control or integrity policies with components that enforcing different policies or even no policy at all.
Book ChapterDOI

Defining Privacy for Weighted Votes, Single and Multi-voter Coercion

TL;DR: A definition for privacy in voting protocols in the Applied π-Calculus is presented and it is proved that under certain realistic assumptions a protocol secure against coercion of a single voter is also secureagainst coercion of multiple voters.
Book ChapterDOI

Vote-independence: a powerful privacy notion for voting protocols

TL;DR: This work extends the classical threat model and introduces a new security notion for voting protocols: Vote-Independence, which is given a formal definition and analyzed its relationship to established privacy properties such as Vote-Privacy, Receipt-Freeness and Coercion-Resistance.