Results 1 - 10
of
9,226
CAPSL and CIL Language Design - A Common Authentication Protocol Specification Language and Its Intermediate Language
, 1999
"... Syntax . . . . . . . . . . . . . . . . . . . . . 28 CONTENTS ii 3.3 CIL Abstract Syntax . . . . . . . . . . . . . . . . . . . . . . . 31 3.4 Type Checking and the Symbol Table . . . . . . . . . . . . . . 32 3.5 Minor Transformations . . . . . . . . . . . . . . . . . . . . . . 33 4 Rule Generation 35 ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
4.5 Slot Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 4.6 Implementability Algorithm . . . . . . . . . . . . . . . . . . . 40 4.7 Local Assertions . . . . . . . . . . . . . . . . . . . . . . . . . . 46 4.8 CIL Specification of EKE . . . . . . . . . . . . . . . . . . . . . 47 4
A logic of authentication
- ACM TRANSACTIONS ON COMPUTER SYSTEMS
, 1990
"... Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required ..."
Abstract
-
Cited by 1332 (22 self)
- Add to MetaCart
Questions of belief are essential in analyzing protocols for the authentication of principals in distributed computing systems. In this paper we motivate, set out, and exemplify a logic specifically designed for this analysis; we show how various protocols differ subtly with respect to the required
The Ponder Policy Specification Language
- LECTURE NOTES IN COMPUTER SCIENCE
, 2001
"... The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management ..."
Abstract
-
Cited by 499 (28 self)
- Add to MetaCart
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management
CAPSL Integrated Protocol Environment
- IN PROC. OF DARPA INFORMATION SURVIVABILITY CONFERENCE (DISCEX 2000), PP 207-221, IEEE COMPUTER SOCIETY
, 2000
"... CAPSL, a Common Authentication Protocol Specification Language, is a high-level language to support security analysis of cryptographic authentication and key distribution protocols. It is translated to CIL, an intermediate language expressing state transitions with term-rewriting rules. Connectors a ..."
Abstract
-
Cited by 67 (7 self)
- Add to MetaCart
CAPSL, a Common Authentication Protocol Specification Language, is a high-level language to support security analysis of cryptographic authentication and key distribution protocols. It is translated to CIL, an intermediate language expressing state transitions with term-rewriting rules. Connectors
A translation approach to portable ontology specifications
- KNOWLEDGE ACQUISITION
, 1993
"... To support the sharing and reuse of formally represented knowledge among AI systems, it is useful to define the common vocabulary in which shared knowledge is represented. A specification of a representational vocabulary for a shared domain of discourse — definitions of classes, relations, functions ..."
Abstract
-
Cited by 3365 (9 self)
- Add to MetaCart
To support the sharing and reuse of formally represented knowledge among AI systems, it is useful to define the common vocabulary in which shared knowledge is represented. A specification of a representational vocabulary for a shared domain of discourse — definitions of classes, relations
Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
, 2003
"... Abstract — As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has n ..."
Abstract
-
Cited by 703 (15 self)
- Add to MetaCart
routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes. I.
Statecharts: A Visual Formalism For Complex Systems
, 1987
"... We present a broad extension of the conventional formalism of state machines and state diagrams, that is relevant to the specification and design of complex discrete-event systems, such as multi-computer real-time systems, communication protocols and digital control units. Our diagrams, which we cal ..."
Abstract
-
Cited by 2704 (56 self)
- Add to MetaCart
We present a broad extension of the conventional formalism of state machines and state diagrams, that is relevant to the specification and design of complex discrete-event systems, such as multi-computer real-time systems, communication protocols and digital control units. Our diagrams, which we
Metaphors We Live By
, 1980
"... 1. Make a list of some of the metaphors discussed by Lakoff and Johnson. Try inserting new words that convey a different meaning. For example, consider the expression, “I’d like to share some time with you ” rather than “spend some time with you.” 2. Make a list of “language asymmetries ” (see Part ..."
Abstract
-
Cited by 3387 (7 self)
- Add to MetaCart
the “medicalized ” terms you hear for a few days (for example, erectile dysfunction, hyperkinesis). Try substituting more common terms and see if you think about the “problem ” differently. For example, clinically depressed versus tired and really burnt out. Do these problems seem more real or authentic
The design and implementation of an intentional naming system
- 17TH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '99) PUBLISHED AS OPERATING SYSTEMS REVIEW, 34(5):186--201, DEC. 1999
, 1999
"... This paper presents the design and implementation of the Intentional Naming System (INS), a resource discovery and service location system for dynamic and mobile networks of devices and computers. Such environments require a naming system that is (i) expressive, to describe and make requests based o ..."
Abstract
-
Cited by 518 (14 self)
- Add to MetaCart
on specific properties of services, (ii) responsive, to track changes due to mobility and performance, (iii) robust, to handle failures, and (iv) easily configurable. INS uses a simple language based on attributes and values for its names. Applications use the language to describe what they are looking for (i
Ontology Development 101: A Guide to Creating Your First Ontology
, 2001
"... In recent years the development of ontologies—explicit formal specifications of the terms in the domain and relations among them (Gruber 1993)—has been moving from the realm of Artificial-Intelligence laboratories to the desktops of domain experts. Ontologies have become common on the World-Wide Web ..."
Abstract
-
Cited by 830 (5 self)
- Add to MetaCart
In recent years the development of ontologies—explicit formal specifications of the terms in the domain and relations among them (Gruber 1993)—has been moving from the realm of Artificial-Intelligence laboratories to the desktops of domain experts. Ontologies have become common on the World
Results 1 - 10
of
9,226