No description
-
2013 (v1)PublicationUploaded on: April 14, 2023
-
2009 (v1)Publication
No description
Uploaded on: March 31, 2023 -
2005 (v1)Publication
No description
Uploaded on: March 31, 2023 -
2003 (v1)Publication
No description
Uploaded on: April 14, 2023 -
2005 (v1)Publication
No description
Uploaded on: October 11, 2023 -
1993 (v1)Publication
No description
Uploaded on: March 31, 2023 -
1998 (v1)Publication
No description
Uploaded on: April 14, 2023 -
2001 (v1)Publication
No description
Uploaded on: March 31, 2023 -
1993 (v1)Publication
No description
Uploaded on: March 31, 2023 -
2000 (v1)Publication
No description
Uploaded on: December 5, 2022 -
2008 (v1)Publication
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of the protocol in a multi-set rewriting formalism and a positive integer k, builds a propositional formula whose models (if any) correspond to attacks on the...
Uploaded on: March 25, 2023 -
2003 (v1)Publication
No description
Uploaded on: March 25, 2023 -
2010 (v1)Publication
The access to Grid resources depends on rules defined by the administrators of the physical organizations and of the Grid middleware. This approach does not require support for access control in the middleware, but since changes in the access control policy of the Virtual Organization imply the involvement of one or more administrators, it...
Uploaded on: March 31, 2023