-
1
-
-
17244368461
-
-
Technical report, Cornell University, Ithaca, NY, USA
-
Bowen Alpern and Fred B. Schneider. Recognizing safety and liveness. Technical report, Cornell University, Ithaca, NY, USA, 1986.
-
(1986)
Recognizing Safety and Liveness
-
-
Alpern, B.1
Schneider, F.B.2
-
2
-
-
26444497860
-
The avispa tool for the automated validation of internet security protocols and applications
-
Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cúellar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, and Laurent Vigneron. The avispa tool for the automated validation of internet security protocols and applications. In CAV, pages 281-285, 2005.
-
(2005)
CAV
, pp. 281-285
-
-
Armando, A.1
Basin, D.A.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cúellar, J.6
Drielsma, P.H.7
Héam, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
5
-
-
36949012693
-
Conman: A step towards network manageability
-
New York, NY, USA, ACM
-
Hitesh Ballani and Paul Francis. Conman: a step towards network manageability. In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '07, pages 205-216, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '07
, pp. 205-216
-
-
Ballani, H.1
Francis, P.2
-
6
-
-
19744367735
-
Ofmc: A symbolic model checker for security protocols
-
June Published online December 2004
-
David Basin, Sebastian Mödersheim, and Luca Viganò. Ofmc: A symbolic model checker for security protocols. International Journal of Information Security, 4(3):181-208, June 2005. Published online December 2004.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
7
-
-
54049153566
-
Tvdc: Managing security in the trusted virtual datacenter
-
January
-
Stefan Berger, Ramón Cáceres, Dimitrios Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, and Deepa Srinivasan. Tvdc: managing security in the trusted virtual datacenter. SIGOPS Oper. Syst. Rev., 42:40-47, January 2008.
-
(2008)
SIGOPS Oper. Syst. Rev.
, vol.42
, pp. 40-47
-
-
Berger, S.1
Cáceres, R.2
Pendarakis, D.3
Sailer, R.4
Valdez, E.5
Perez, R.6
Schildhauer, W.7
Srinivasan, D.8
-
8
-
-
78650122895
-
Security audits of multi-tier virtual infrastructures in public infrastructure clouds
-
New York, NY, USA, ACM
-
Sören Bleikertz, Matthias Schunter, Christian W. Probst, Dimitrios Pendarakis, and Konrad Eriksson. Security audits of multi-tier virtual infrastructures in public infrastructure clouds. In Proceedings of the 2010 ACM workshop on Cloud computing security workshop, CCSW '10, pages 93-102, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10
, pp. 93-102
-
-
Bleikertz, S.1
Schunter, M.2
Probst, C.W.3
Pendarakis, D.4
Eriksson, K.5
-
9
-
-
84944048132
-
The ponder policy specification language
-
London, UK, Springer- Verlag
-
Nicodemos Damianou, Naranker Dulay, Emil Lupu, and Morris Sloman. The ponder policy specification language. In Proceedings of the International Workshop on Policies for Distributed Systems and Networks, POLICY '01, pages 18-38, London, UK, 2001. Springer- Verlag.
-
(2001)
Proceedings of the International Workshop on Policies for Distributed Systems and Networks, POLICY '01
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
11
-
-
0038507387
-
Alloy: A lightweight object modelling notation
-
April
-
Daniel Jackson. Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol., 11:256-290, April 2002.
-
(2002)
ACM Trans. Softw. Eng. Methodol.
, vol.11
, pp. 256-290
-
-
Jackson, D.1
-
12
-
-
84893084758
-
A policy language for a pervasive computing environment
-
Washington, DC, USA, IEEE Computer Society
-
Lalana Kagal, Tim Finin, and Anupam Joshi. A policy language for a pervasive computing environment. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '03, pages 63-, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '03
, pp. 63
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
13
-
-
74049129266
-
A toolkit for automating and visualizing vlan configuration
-
New York, NY, USA, ACM
-
Sunil D. Krothapalli, Xin Sun, Yu-Wei E. Sung, Suan Aik Yeo, and Sanjay G. Rao. A toolkit for automating and visualizing vlan configuration. In SafeConfig '09: Proceedings of the 2nd ACM workshop on Assurable and usable security configuration, pages 63-70, New York, NY, USA, 2009. ACM.
-
(2009)
SafeConfig '09: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration
, pp. 63-70
-
-
Krothapalli, S.D.1
Sun, X.2
Sung, Y.E.3
Yeo, S.A.4
Rao, S.G.5
-
14
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
March
-
L. Lamport. Proving the correctness of multiprocess programs. IEEE Trans. Softw. Eng., 3:125-143, March 1977.
-
(1977)
IEEE Trans. Softw. Eng.
, vol.3
, pp. 125-143
-
-
Lamport, L.1
-
15
-
-
70450272524
-
Virtual machine contracts for datacenter and cloud computing environments
-
New York, NY, USA, ACM
-
Jeanna Matthews, Tal Garfinkel, Christofer Hoff, and Jeff Wheeler. Virtual machine contracts for datacenter and cloud computing environments. In Proceedings of the 1st workshop on Automated control for datacenters and clouds, ACDC '09, pages 25-30, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds, ACDC '09
, pp. 25-30
-
-
Matthews, J.1
Garfinkel, T.2
Hoff, C.3
Wheeler, J.4
-
16
-
-
34948869197
-
Network configuration management via model finding
-
LISA '05, Berkeley, CA, USA, USENIX Association
-
Sanjai Narain. Network configuration management via model finding. In Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19, LISA '05, pages 15-15, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
Proceedings of the 19th Conference on Large Installation System Administration Conference
, vol.19
, pp. 15-15
-
-
Narain, S.1
-
18
-
-
84875570984
-
Why do internet services fail, and what can be done about it?
-
USITS'03, Berkeley, CA, USA, USENIX Association
-
David Oppenheimer, Archana Ganapathi, and David A. Patterson. Why do internet services fail, and what can be done about it? In Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4, USITS'03, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems
, vol.4
-
-
Oppenheimer, D.1
Ganapathi, A.2
Patterson, D.A.3
-
19
-
-
0003267035
-
Isabelle: A Generic Theorem Prover
-
Springer - Berlin
-
Lawrence C. Paulson. Isabelle: a Generic Theorem Prover. Number 828 in Lecture Notes in Computer Science. Springer - Berlin, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.828
-
-
Paulson, L.C.1
-
20
-
-
74049152260
-
Hey, You, Get off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds
-
New York, NY, USA, ACM
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 199-212, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
21
-
-
51949119355
-
-
Technical Report RC23511, IBM Research
-
Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Ronald Perez, Leendert Van Doorn, John Linwood Griffin, Stefan Berger, Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Ronald Perez, Leendert Doorn, John Linwood, and Griffin Stefan Berger. sHype: Secure Hypervisor Approach to Trusted Virtualized Systems. Technical Report RC23511, IBM Research, 2005.
-
(2005)
sHype: Secure Hypervisor Approach to Trusted Virtualized Systems
-
-
Sailer, R.1
Valdez, E.2
Jaeger, T.3
Perez, R.4
Van Doorn, L.5
Griffin, J.L.6
Berger, S.7
Sailer, R.8
Valdez, E.9
Jaeger, T.10
Perez, R.11
Doorn, L.12
Linwood, J.13
Berger, G.S.14
-
22
-
-
21844478833
-
-
Geoffrey G. Xie, Jibin Zhan, David A. Maltz, Hui Zhang, Albert Greenberg, Gisli Hjalmtysson, and Jennifer Rexford. On Static Reachability Analysis of IP Networks, 2004.
-
(2004)
On Static Reachability Analysis of IP Networks
-
-
Xie, G.G.1
Zhan, J.2
Maltz, D.A.3
Zhang, H.4
Greenberg, A.5
Hjalmtysson, G.6
Rexford, J.7
|