17 research outputs found

    A conference management system with verified document confidentiality

    Get PDF
    We present a case study in verified security for realistic systems: the implementation of a conference management system, whose functional kernel is faithfully represented in the Isabelle theorem prover, where we specify and verify confidentiality properties. The various theoretical and practical challenges posed by this development led to a novel security model and verification method generally applicable to systems describable as input–output automata

    Virtual Disk Monitor Based on Multi-core EFI

    No full text

    Frigate: a user-extensible OO file system

    No full text

    Resilient Self-Organizing Overlay Networks for Security Update Delivery

    No full text

    Detecting System Emulators

    No full text

    Virtage: Server Virtualization with Hardware Transparency

    No full text

    Secure personal computing in an insecure network

    No full text
    corecore