Learn More
The Secure Electronic Transaction (SET) protocol has been proposed by a consortium of credit card companies and software corporations to secure e-commerce transactions. When the customer makes a purchase, the SET dual signature guarantees authenticity while keeping the customer's account details secret from the merchant and his choice of goods secret from(More)
1 Motivations We propose a tableaux calculus requiring simple exponential time for satissability of an ALC concept C wrt a TBox T containing general axioms of the form C v D. >From correspondences with Propositional Dynamic Logic (PDL) it is known that this problem is in EX-PTIME Pratt, 1978; Vardi and Wolper, 1986]. However , an algorithm directly derived(More)
—We investigate non-interference (secure information flow) policies for web browsers, replacing or complementing the Same Origin Policy. First, we adapt a recently proposed dynamic information flow enforcement mechanism to support asynchronous I/O. We prove detailed security and precision results for this enforcement mechanism, and implement it for the(More)
Autonomic communications seek to improve the ability of network and services to cope with unpredicted change, including changes in topology, load, task, the physical and logical characteristics of the networks that can be accessed, and so forth. Broad-ranging autonomic solutions require designers to account for a range of end-to-end issues affecting(More)
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements phase. Methodologies in this field are challenging as they must take into account subtle notions such as trust (or lack thereof), delegation, and permission; they must also model(More)
The last years have seen a number of proposals to incorporate Security Engineering into mainstream Software Requirements Engineering. However, capturing trust and security requirements at an organizational level (as opposed to a design level) is still an open problem. This paper presents a formal framework for modeling and analyzing security and trust(More)
This paper presents a preexed tableaux calculus for Proposi-tional Dynamic Logic with Converse based on a combination of diierent techniques such as preexed tableaux for modal logics and model checkers for-calculus. We prove the correctness and completeness of the calculus and illustrate its features. We also discuss the transformation of the tableaux(More)