20,583 Hits in 7.2 sec

A robust machine code proof framework for highly secure applications

David S. Hardin, Eric W. Smith, William D. Young
2006 Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications - ACL2 '06  
In this paper, we will summarize the AAMP7G architecture, detail our ACL2 model of the processor, and describe our development of the compositional cutpoint method into a robust machine code proof framework  ...  To support secure application development at the highest EALs, we have developed techniques to largely automate the process of producing proofs of correctness of machine code.  ...  proofs.  ... 
doi:10.1145/1217975.1217978 dblp:conf/acl2/HardinSY06 fatcat:vntwmgkhuzakdbxwyi4ylty4am

Trustless Grid Computing in ConCert [chapter]

Bor-Yuh Evan Chang, Karl Crary, Margaret DeLap, Robert Harper, Jason Liszka, Tom Murphy VII, Frank Pfenning
2002 Lecture Notes in Computer Science  
Certified code complements authentication and provides a foundation for a safe, secure, and efficient framework that executes native code.  ...  In this paper, we present a novel solution based on the notion of certified code that upholds safety, security, and privacy policies by examining intrinsic properties of code.  ...  Our implementation and protocols, especially the workstealing protocol and code to support TAL verification, are based largely on Joshua Dunfield's initial implementation of the ConCert framework.  ... 
doi:10.1007/3-540-36133-2_11 fatcat:g55xsrt745hkbf2do77yhuphue

Dynamic Reconfigurable Software Architecture [chapter]

Amar Ramdane-Cherif, Nicole Levy, Francisca Losavio
2002 IFIP Advances in Information and Communication Technology  
In addition, we adopt the B formal method to support design specifications for agent software architecture.  ...  Formal modeling of a specification of our agent software architecture enables us to analyze and reason about it ,with mathematical precision and aHows obtaining the abstract specification of the initial  ...  In the next section, we describe an application which is highly simplified for presentation purpose. Finally, the paper concludes with a discussion of future directions for this work.  ... 
doi:10.1007/978-0-387-35607-5_5 fatcat:jpx2v6dsofcfxeflgqhvnby7kq

Towards Flexible Anonymous Networks [article]

Florentin Rochet, Tariq Elahi
2022 arXiv   pre-print
We realize an implementation, evaluate the overheads and, experiment with several of FAN's benefits to defend against a severe attack still applicable to Tor today.  ...  To address this issue, we propose FAN for Flexible Anonymous Network, a new software architecture for volunteer-based distributed networks that shifts the dependence away from protocol tolerance without  ...  That is, providing that we meet network-wide security and safety concerns, what would code plugged in by an application to its own circuits offer?  ... 
arXiv:2203.03764v1 fatcat:35engu5zxbhknjrs6undiddcs4

Practical Formal Methods for Real World Cryptography (Invited Talk)

Karthikeyan Bhargavan, Prasad Naldurg, Michael Wagner
2019 Foundations of Software Technology and Theoretical Computer Science  
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and errors and vulnerabilities in their code can remain undiscovered for long periods before they are exploited  ...  We describe a tool chain and framework based on the F * programming language to formally specify, verify and compile high-performance cryptographic software that is secure by design.  ...  HACL * provides a robust basis for building high-assurance cryptographic applications, but the cryptographic library is only one component of the security stack.  ... 
doi:10.4230/lipics.fsttcs.2019.1 dblp:conf/fsttcs/BhargavanN19 fatcat:uyj2x66q5rcr5ns6zidmsto7yi

Improved Performance for Secured Authentication in User Devices and Cloud Environment

2020 International journal of recent technology and engineering  
Also, a novel model called as Integrated Framework for Cloud Security (IFCS) that performs mainly three task i) faster and robust user authentication, ii) maintaining anonymity of data storage location  ...  This paper presents" SRAAM: Secure Resource Access Authentication Mechanism", a collaborative framework between user mobile device and cloud infrastructure, for authenticating user and device credentials  ...  The prime purpose of this stage of the study will be to design a framework that can manage robust security of virtual machine.  ... 
doi:10.35940/ijrte.e6329.018520 fatcat:mlts4wsjpndb7ev7i4otjywity

Chameleon: A Semi-AutoML framework targeting quick and scalable development and deployment of production-ready ML systems for SMEs [article]

Johannes Otterbach, Thomas Wollmann
2021 arXiv   pre-print
Developing, scaling, and deploying modern Machine Learning solutions remains challenging for small- and middle-sized enterprises (SMEs).  ...  To address this challenge, we discuss the implementation and concepts of Chameleon, a semi-AutoML framework.  ...  Acknowledgements The research leading to these results is funded by EU ECSEL Project SECREDAS Cyber Security for Cross Domain Reliable Dependable Automated Systems (Grant Number: 783119).  ... 
arXiv:2105.03669v1 fatcat:4zrkui5qtnc5xl6zl3bswrr7qa

Position paper: the science of deep specification

Andrew W. Appel, Lennart Beringer, Adam Chlipala, Benjamin C. Pierce, Zhong Shao, Stephanie Weirich, Steve Zdancewic
2017 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
)) and live (connected via machine-checkable proofs to the implementation and client code).  ...  (iii) A running compiler is obtained by composing the Gallina functions of all transformations, extracting the resulting code into OCaml and using the standard OCaml compilation framework.  ...  We thank the graduate students and post-doctoral researchers of our research groups for their contributions, and our external academic and industrial collaborators for their participation.  ... 
doi:10.1098/rsta.2016.0331 pmid:28871056 fatcat:ztgho4isajbchi4bghlegxns7m

Blockchain for Mobile Edge Computing: Consensus Mechanisms and Scalability [article]

Jorge Peña Queralta, Tomi Westerlund
2020 arXiv   pre-print
The integration of such a variety of MEC services in a inherently distributed architecture requires a robust system for managing hardware resources, balancing the network load and securing the distributed  ...  applications.  ...  Proof of Stake The basis for security and robustness in a PoW system comes from the amount of computational resources needed in order to gain control over the network.  ... 
arXiv:2006.07578v1 fatcat:y7uim6do3ndmvdcqlwpjszxweu

Agent Paradigm for Adaptable Architecture

Amar Ramdane-Cherif, Nicole Levy, Francisca Losavio
2004 Journal of Object Technology  
In the next section, we will introduce the related work and then our approach and some ideas about its methodology and framework will be presented.  ...  In addition, we adopt the B formal method to support design specifications for agent software architecture.  ...  which is highly simplified for presentation purpose.  ... 
doi:10.5381/jot.2004.3.8.a4 fatcat:tj5fycn66fbh7lsq474c2t5n5u

A cost-effective 2-tier security paradigm to safeguard cloud data with faster authentication

Veena R.S, Ramachandra V. Pujeri, Indiramma M
2019 International Journal of Electrical and Computer Engineering (IJECE)  
Thereby, the study introduces a 2-tier framework which offers higher-degree of access control along with Virtual Machine (VM) storage security.  ...  The outcome obtained demonstrate that the proposed solution outperforms the existing security standards in terms of processing time, time to generate a secret key and key size for encryption.  ...  Hence, virtual machines to be highly secured. The proposed system configures the length of the code (C L ) using two network parameters (Line-6).  ... 
doi:10.11591/ijece.v9i5.pp3833-3842 fatcat:tqkxfravpzdafmwz4fnxj5myrm

A Proposed Cloud Security Framework for Service Providers in Ghana

Richard Okoampa-Larbi, Frimpong Twum, J. B.
2017 International Journal of Computer Applications  
The study proposes a cloud security framework for Cloud Service Providers (CSPs) in Ghana.  ...  of proposing a new cloud security framework.  ...  There is however, the need to propose a more viable and a valid security framework for Cloud Service Providers, which will be based on a more robust and efficient security technologies and systems.  ... 
doi:10.5120/ijca2017912722 fatcat:wyuhgjfw4vclhbq45ccnupn5pm

Towards Blockchain for Decentralized Self-Organizing Wireless Networks [article]

Steven Platt, Miquel Oliver-Riera
2020 arXiv   pre-print
Although these general-purpose platforms have matured for scale and security, they are designed for human incentive and continue to require currency reward and contract functions that are not requisite  ...  in machine communications.  ...  is a less natural fit for machines.  ... 
arXiv:2004.12438v1 fatcat:g2cf6uiqcferngere54pvqaj7q

Software as a Service: Analyzing Security Issues [article]

Pushpinder Kaur Chouhan, Feng Yao, Suleiman Y. Yerima, Sakir Sezer
2015 arXiv   pre-print
Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.  ...  It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security.  ...  For the future convenience and development, a robust authentication framework should be established which is suitable for the deployment of implicit authentication to securely collect and transfer required  ... 
arXiv:1505.01711v1 fatcat:pnwkovzsd5hqrpcmh6dakmi7xi

Network and information security: A computational intelligence approach

Ajith Abraham, Kate Smith, Ravi Jain, Lakhmi Jain
2007 Journal of Network and Computer Applications  
Authors integrated a role based delegation framework to propose system architecture and the framework is illustrated through a proof-of-concept implementation.  ...  Empirical results reveal that the new method is robust and easy to implement and also provides faster coding time, better imperceptibility than some related vector quantization schemes proposed in the  ... 
doi:10.1016/j.jnca.2005.06.004 fatcat:qwqxsxofzrehrojed2hjwawj3m
« Previous Showing results 1 — 15 out of 20,583 results