Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2022
Automating cryptographic protocol language generation from structured specifications
FormaliSE '22: Proceedings of the IEEE/ACM 10th International Conference on Formal Methods in Software EngineeringMay 2022, pp 91–101https://doi.org/10.1145/3524482.3527654Security of cryptographic protocols can be analysed by creating a model in a formal language and verifying the model in a tool. All such tools focus on the last part of the analysis, verification, and the interpretation of the specification is only ...
- research-articleJanuary 2022
Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication1
Journal of Computer Security (JOCS), Volume 30, Issue 42022, pp 623–653https://doi.org/10.3233/JCS-210037The threat of a cryptographically relevant quantum computer contributes to an increasing interest in the field of post-quantum cryptography (PQC). Compared to existing research efforts regarding the integration of PQC into the Transport Layer Security (...
- posterNovember 2019
Poster: Towards a Data Centric Approach for the Design and Verification of Cryptographic Protocols
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityNovember 2019, pp 2585–2587https://doi.org/10.1145/3319535.3363262We propose MetaCP, a Meta Cryptography Protocol verification tool, as an automated tool simplifying the design of security protocols through a graphical interface. The graphical interface can be seen as a modern editor of a non-relational database whose ...
- research-articleOctober 2016
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityOctober 2016, pp 142–153https://doi.org/10.1145/2976749.2978419Security against hardware trojans is currently becoming an essential ingredient to ensure trust in information systems. A variety of solutions have been introduced to reach this goal, ranging from reactive (i.e., detection-based) to preventive (i.e., ...
- articleDecember 1994
Formal query languages for secure relational databases
ACM Transactions on Database Systems (TODS), Volume 19, Issue 4pp 626–662https://doi.org/10.1145/195664.195675The addition of stringent security specifications to the list of requirements for an application poses many new problems in DBMS design and implementation, as well as database design, use, and maintenance. Tight security requirements, such as those that ...
-
- articleMarch 1994
A taxonomy for secure object-oriented databases
ACM Transactions on Database Systems (TODS), Volume 19, Issue 1pp 3–46https://doi.org/10.1145/174638.174640This paper proposes a taxonomy for secure object-oriented databases in order to clarify the issues in modeling and implementing such databases. It also indicates some implications of the various choices one may make when designing such a database.
Most ...