A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
A robust machine code proof framework for highly secure applications
2006
Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications - ACL2 '06
In this paper, we will summarize the AAMP7G architecture, detail our ACL2 model of the processor, and describe our development of the compositional cutpoint method into a robust machine code proof framework ...
To support secure application development at the highest EALs, we have developed techniques to largely automate the process of producing proofs of correctness of machine code. ...
proofs. ...
doi:10.1145/1217975.1217978
dblp:conf/acl2/HardinSY06
fatcat:vntwmgkhuzakdbxwyi4ylty4am
Trustless Grid Computing in ConCert
[chapter]
2002
Lecture Notes in Computer Science
Certified code complements authentication and provides a foundation for a safe, secure, and efficient framework that executes native code. ...
In this paper, we present a novel solution based on the notion of certified code that upholds safety, security, and privacy policies by examining intrinsic properties of code. ...
Our implementation and protocols, especially the workstealing protocol and code to support TAL verification, are based largely on Joshua Dunfield's initial implementation of the ConCert framework. ...
doi:10.1007/3-540-36133-2_11
fatcat:g55xsrt745hkbf2do77yhuphue
Dynamic Reconfigurable Software Architecture
[chapter]
2002
IFIP Advances in Information and Communication Technology
In addition, we adopt the B formal method to support design specifications for agent software architecture. ...
Formal modeling of a specification of our agent software architecture enables us to analyze and reason about it ,with mathematical precision and aHows obtaining the abstract specification of the initial ...
In the next section, we describe an application which is highly simplified for presentation purpose. Finally, the paper concludes with a discussion of future directions for this work. ...
doi:10.1007/978-0-387-35607-5_5
fatcat:jpx2v6dsofcfxeflgqhvnby7kq
Towards Flexible Anonymous Networks
[article]
2022
arXiv
pre-print
We realize an implementation, evaluate the overheads and, experiment with several of FAN's benefits to defend against a severe attack still applicable to Tor today. ...
To address this issue, we propose FAN for Flexible Anonymous Network, a new software architecture for volunteer-based distributed networks that shifts the dependence away from protocol tolerance without ...
That is, providing that we meet network-wide security and safety concerns, what would code plugged in by an application to its own circuits offer? ...
arXiv:2203.03764v1
fatcat:35engu5zxbhknjrs6undiddcs4
Practical Formal Methods for Real World Cryptography (Invited Talk)
2019
Foundations of Software Technology and Theoretical Computer Science
Cryptographic algorithms, protocols, and applications are difficult to implement correctly, and errors and vulnerabilities in their code can remain undiscovered for long periods before they are exploited ...
We describe a tool chain and framework based on the F * programming language to formally specify, verify and compile high-performance cryptographic software that is secure by design. ...
HACL * provides a robust basis for building high-assurance cryptographic applications, but the cryptographic library is only one component of the security stack. ...
doi:10.4230/lipics.fsttcs.2019.1
dblp:conf/fsttcs/BhargavanN19
fatcat:uyj2x66q5rcr5ns6zidmsto7yi
Improved Performance for Secured Authentication in User Devices and Cloud Environment
2020
International journal of recent technology and engineering
Also, a novel model called as Integrated Framework for Cloud Security (IFCS) that performs mainly three task i) faster and robust user authentication, ii) maintaining anonymity of data storage location ...
This paper presents" SRAAM: Secure Resource Access Authentication Mechanism", a collaborative framework between user mobile device and cloud infrastructure, for authenticating user and device credentials ...
The prime purpose of this stage of the study will be to design a framework that can manage robust security of virtual machine. ...
doi:10.35940/ijrte.e6329.018520
fatcat:mlts4wsjpndb7ev7i4otjywity
Chameleon: A Semi-AutoML framework targeting quick and scalable development and deployment of production-ready ML systems for SMEs
[article]
2021
arXiv
pre-print
Developing, scaling, and deploying modern Machine Learning solutions remains challenging for small- and middle-sized enterprises (SMEs). ...
To address this challenge, we discuss the implementation and concepts of Chameleon, a semi-AutoML framework. ...
Acknowledgements The research leading to these results is funded by EU ECSEL Project SECREDAS Cyber Security for Cross Domain Reliable Dependable Automated Systems (Grant Number: 783119). ...
arXiv:2105.03669v1
fatcat:4zrkui5qtnc5xl6zl3bswrr7qa
Position paper: the science of deep specification
2017
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences
)) and live (connected via machine-checkable proofs to the implementation and client code). ...
(iii) A running compiler is obtained by composing the Gallina functions of all transformations, extracting the resulting code into OCaml and using the standard OCaml compilation framework. ...
We thank the graduate students and post-doctoral researchers of our research groups for their contributions, and our external academic and industrial collaborators for their participation. ...
doi:10.1098/rsta.2016.0331
pmid:28871056
fatcat:ztgho4isajbchi4bghlegxns7m
Blockchain for Mobile Edge Computing: Consensus Mechanisms and Scalability
[article]
2020
arXiv
pre-print
The integration of such a variety of MEC services in a inherently distributed architecture requires a robust system for managing hardware resources, balancing the network load and securing the distributed ...
applications. ...
Proof of Stake The basis for security and robustness in a PoW system comes from the amount of computational resources needed in order to gain control over the network. ...
arXiv:2006.07578v1
fatcat:y7uim6do3ndmvdcqlwpjszxweu
Agent Paradigm for Adaptable Architecture
2004
Journal of Object Technology
In the next section, we will introduce the related work and then our approach and some ideas about its methodology and framework will be presented. ...
In addition, we adopt the B formal method to support design specifications for agent software architecture. ...
which is highly simplified for presentation purpose. ...
doi:10.5381/jot.2004.3.8.a4
fatcat:tj5fycn66fbh7lsq474c2t5n5u
A cost-effective 2-tier security paradigm to safeguard cloud data with faster authentication
2019
International Journal of Electrical and Computer Engineering (IJECE)
Thereby, the study introduces a 2-tier framework which offers higher-degree of access control along with Virtual Machine (VM) storage security. ...
The outcome obtained demonstrate that the proposed solution outperforms the existing security standards in terms of processing time, time to generate a secret key and key size for encryption. ...
Hence, virtual machines to be highly secured. The proposed system configures the length of the code (C L ) using two network parameters (Line-6). ...
doi:10.11591/ijece.v9i5.pp3833-3842
fatcat:tqkxfravpzdafmwz4fnxj5myrm
A Proposed Cloud Security Framework for Service Providers in Ghana
2017
International Journal of Computer Applications
The study proposes a cloud security framework for Cloud Service Providers (CSPs) in Ghana. ...
of proposing a new cloud security framework. ...
There is however, the need to propose a more viable and a valid security framework for Cloud Service Providers, which will be based on a more robust and efficient security technologies and systems. ...
doi:10.5120/ijca2017912722
fatcat:wyuhgjfw4vclhbq45ccnupn5pm
Towards Blockchain for Decentralized Self-Organizing Wireless Networks
[article]
2020
arXiv
pre-print
Although these general-purpose platforms have matured for scale and security, they are designed for human incentive and continue to require currency reward and contract functions that are not requisite ...
in machine communications. ...
is a less natural fit for machines. ...
arXiv:2004.12438v1
fatcat:g2cf6uiqcferngere54pvqaj7q
Software as a Service: Analyzing Security Issues
[article]
2015
arXiv
pre-print
Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform. ...
It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. ...
For the future convenience and development, a robust authentication framework should be established which is suitable for the deployment of implicit authentication to securely collect and transfer required ...
arXiv:1505.01711v1
fatcat:pnwkovzsd5hqrpcmh6dakmi7xi
Network and information security: A computational intelligence approach
2007
Journal of Network and Computer Applications
Authors integrated a role based delegation framework to propose system architecture and the framework is illustrated through a proof-of-concept implementation. ...
Empirical results reveal that the new method is robust and easy to implement and also provides faster coding time, better imperceptibility than some related vector quantization schemes proposed in the ...
doi:10.1016/j.jnca.2005.06.004
fatcat:qwqxsxofzrehrojed2hjwawj3m
« Previous
Showing results 1 — 15 out of 20,583 results