Zobrazeno 1 - 10
of 134
pro vyhledávání: '"FOURNET, CÉDRIC"'
Autor:
Howard, Heidi, Alder, Fritz, Ashton, Edward, Chamayou, Amaury, Clebsch, Sylvan, Costa, Manuel, Delignat-Lavaud, Antoine, Fournet, Cedric, Jeffery, Andrew, Kerner, Matthew, Kounelis, Fotios, Kuppe, Markus A., Maffre, Julien, Russinovich, Mark, Wintersteiger, Christoph M.
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential properties for trustworthy data systems. The rise of cloud computing and the growing demand for multiparty applications however means that building modern
Externí odkaz:
http://arxiv.org/abs/2310.11559
Autor:
DELIGNAT-LAVAUD, ANTOINE1, FOURNET, CÉDRIC2, VASWANI, KAPIL3, CLEBSCH, SYLVAN4, RIECHERT, MAIK5, COSTA, MANUEL6, RUSSINOVICH, MARK7
Publikováno v:
Communications of the ACM. Jan2024, Vol. 67 Issue 1, p68-78. 9p.
Autor:
Vaswani, Kapil, Volos, Stavros, Fournet, Cédric, Diaz, Antonio Nino, Gordon, Ken, Vembu, Balaji, Webster, Sam, Chisnall, David, Kulkarni, Saurabh, Cunningham, Graham, Osborne, Richard, Wilkinson, Dan
We present IPU Trusted Extensions (ITX), a set of experimental hardware extensions that enable trusted execution environments in Graphcore's AI accelerators. ITX enables the execution of AI workloads with strong confidentiality and integrity guarante
Externí odkaz:
http://arxiv.org/abs/2205.09005
Autor:
Shamis, Alex, Pietzuch, Peter, Castro, Miguel, Fournet, Cédric, Ashton, Edward, Chamayou, Amaury, Clebsch, Sylvan, Delignat-Lavaud, Antoine, Kerner, Matthew, Maffre, Julien, Costa, Manuel, Russinovich, Mark
Permissioned ledger systems allow a consortium of members that do not trust one another to execute transactions safely on a set of replicas. Such systems typically use Byzantine fault tolerance (BFT) protocols to distribute trust, which only ensures
Externí odkaz:
http://arxiv.org/abs/2105.13116
Autor:
England, Paul, Malvar, Henrique S., Horvitz, Eric, Stokes, Jack W., Fournet, Cédric, Burke-Aguero, Rebecca, Chamayou, Amaury, Clebsch, Sylvan, Costa, Manuel, Deutscher, John, Erfani, Shabnam, Gaylor, Matt, Jenks, Andrew, Kane, Kevin, Redmiles, Elissa, Shamis, Alex, Sharma, Isha, Wenker, Sam, Zaman, Anika
Advances in graphics and machine learning have led to the general availability of easy-to-use tools for modifying and synthesizing media. The proliferation of these tools threatens to cast doubt on the veracity of all media. One approach to thwarting
Externí odkaz:
http://arxiv.org/abs/2001.07886
Autor:
Ahman, Danel, Fournet, Cédric, Hritcu, Catalin, Maillard, Kenji, Rastogi, Aseem, Swamy, Nikhil
We provide a way to ease the verification of programs whose state evolves monotonically. The main idea is that a property witnessed in a prior state can be soundly recalled in the current state, provided (1) state evolves according to a given preorde
Externí odkaz:
http://arxiv.org/abs/1707.02466
Autor:
Grimm, Niklas, Maillard, Kenji, Fournet, Cédric, Hritcu, Catalin, Maffei, Matteo, Protzenko, Jonathan, Ramananandro, Tahina, Rastogi, Aseem, Swamy, Nikhil, Zanella-Béguelin, Santiago
Relational properties describe multiple runs of one or more programs. They characterize many useful notions of security, program refinement, and equivalence for programs with diverse computational effects, and they have received much attention in the
Externí odkaz:
http://arxiv.org/abs/1703.00055
Autor:
Protzenko, Jonathan, Zinzindohoué, Jean-Karim, Rastogi, Aseem, Ramananandro, Tahina, Wang, Peng, Zanella-Béguelin, Santiago, Delignat-Lavaud, Antoine, Hritcu, Catalin, Bhargavan, Karthikeyan, Fournet, Cédric, Swamy, Nikhil
We present Low*, a language for low-level programming and verification, and its application to high-assurance optimized cryptographic libraries. Low* is a shallow embedding of a small, sequential, well-behaved subset of C in F*, a dependently-typed v
Externí odkaz:
http://arxiv.org/abs/1703.00053
We study the interaction of the programming construct "new", which generates statically scoped names, with communication via messages on channels. This interaction is crucial in security protocols, which are the main motivating examples for our work,
Externí odkaz:
http://arxiv.org/abs/1609.03003
Web services security specifications are typically expressed as a mixture of XML schemas, example messages, and narrative explanations. We propose a new specification language for writing complementary machine-checkable descriptions of SOAP-based sec
Externí odkaz:
http://arxiv.org/abs/cs/0412044