Zobrazeno 1 - 10
of 275
pro vyhledávání: '"Hanne Riis Nielson"'
Publikováno v:
Logical Methods in Computer Science, Vol Volume 12, Issue 4 (2017)
In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially when distributed components are involved, it is hard to predict and confront all possible att
Externí odkaz:
https://doaj.org/article/70792773ce334649a1e802cf60903472
Publikováno v:
Logical Methods in Computer Science, Vol Volume 13, Issue 1 (2017)
We present a coordination language for the modeling of distributed database applications. The language, baptized Klaim-DB, borrows the concepts of localities and nets of the coordination language Klaim but re-incarnates the tuple spaces of Klaim as d
Externí odkaz:
https://doaj.org/article/f87cae27871c4e5aa6689ff6be6e63ae
Publikováno v:
Nielson, F, Hansen, R R & Nielson, H R 2021, Benign Interaction of Security Domains . in D Dougherty, J Meseguer, S A Mödersheim & P Rowe (eds), Protocols, Strands, and Logic : Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday . Springer, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 13066 LNCS, pp. 312-331 . https://doi.org/10.1007/978-3-030-91631-2_17
Protocols, Strands, and Logic ISBN: 9783030916305
Protocols, Strands, and Logic ISBN: 9783030916305
Whenever data is communicated outside a security domain there is the risk that it may influence data coming back in a way that is not permitted by the security domain. This may arise when different security domains relate to different parallel proces
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a2e38f2cda6f12984ccb54527a80a69
https://vbn.aau.dk/da/publications/398e9363-5591-42bd-b4fe-cd68bdf734d2
https://vbn.aau.dk/da/publications/398e9363-5591-42bd-b4fe-cd68bdf734d2
Autor:
Flemming Nielson, Hanne Riis Nielson
Publikováno v:
From Lambda Calculus to Cybersecurity Through Program Analysis ISBN: 9783030411022
From Lambda Calculus to Cybersecurity Through Program Analysis
From Lambda Calculus to Cybersecurity Through Program Analysis
We develop a lightweight approach to information flow control that interacts with the use of cryptographic schemes. The language is a version of Dijkstra’s Guarded Commands language extended with parallelism, communication and symmetric cryptograph
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2dcb384b19eacbaa34373bc47564fee5
https://doi.org/10.1007/978-3-030-41103-9_7
https://doi.org/10.1007/978-3-030-41103-9_7
Publikováno v:
Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles ISBN: 9783030614690
ISoLA (2)
Nielson, F, Hansen, R R & Nielson, H R 2020, Adaptive Security Policies . in Engineering Principles . Springer, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12477, pp. 280-294, International Symposium On Leveraging Applications of Formal Methods, Verification and Validation 2020, Greece, 20/10/2020 . https://doi.org/10.1007/978-3-030-61470-6_17
ISoLA (2)
Nielson, F, Hansen, R R & Nielson, H R 2020, Adaptive Security Policies . in Engineering Principles . Springer, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 12477, pp. 280-294, International Symposium On Leveraging Applications of Formal Methods, Verification and Validation 2020, Greece, 20/10/2020 . https://doi.org/10.1007/978-3-030-61470-6_17
We develop an approach to security of adaptive agents that is based on respecting the local security policies of agents rather than imposing a global security policy on all agents. In short, an agent can be assured, that it will not be able to observ
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ec6b700b2116fc0cbb762bb6b0390697
https://doi.org/10.1007/978-3-030-61470-6_17
https://doi.org/10.1007/978-3-030-61470-6_17
Autor:
Flemming Nielson, Hanne Riis Nielson
Publikováno v:
Computer Languages, Systems & Structures. 50:82-107
Several program verification techniques assist in showing that software adheres to the required security policies. Such policies may be sensitive to the flow of execution and the verification may be supported by combinations of type systems and Hoare
Autor:
Flemming Nielson, Hanne Riis Nielson
Publikováno v:
Journal of Logical and Algebraic Methods in Programming. 87:6-32
Information flow control extends access control by not only regulating who is allowed to access what data but also the subsequent use of the data. Applications within communications systems require such information flow control to be dependent on the
Publikováno v:
Li, X, Nielson, F & Nielson, H R 2019, ' Enforcing globally dependent flow policies in message-passing systems ', Journal of Computer Languages, vol. 54, 100904 . https://doi.org/10.1016/j.cola.2019.100904
The flow of information in a computing system is a crucial indicator for the security of the system. In a system of multiple message-passing processes, the flow of information could depend on the states of different processes. We devise a type-based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::549eb7e736e98ea59b999171f11968d1
https://orbit.dtu.dk/en/publications/e942b36f-72af-4213-a3aa-1b7a4173256e
https://orbit.dtu.dk/en/publications/e942b36f-72af-4213-a3aa-1b7a4173256e
Publikováno v:
CSF
Vasilikos, P, Nielson, H R, Nielson, F & Kopf, B 2019, Timing leaks and coarse-grained clocks . in Proceedings of 2019 IEEE 32 nd Computer Security Foundations Symposium ., 8823781, IEEE Computer Society Press, Proceedings-IEEE Computer Security Foundations Symposium, vol. 2019-June, pp. 32-47, 2019 IEEE 32nd Computer Security Foundations Symposium, Hoboken, New Jersey, United States, 25/06/2019 . https://doi.org/10.1109/CSF.2019.00010
Vasilikos, P, Nielson, H R, Nielson, F & Kopf, B 2019, Timing leaks and coarse-grained clocks . in Proceedings of 2019 IEEE 32 nd Computer Security Foundations Symposium ., 8823781, IEEE Computer Society Press, Proceedings-IEEE Computer Security Foundations Symposium, vol. 2019-June, pp. 32-47, 2019 IEEE 32nd Computer Security Foundations Symposium, Hoboken, New Jersey, United States, 25/06/2019 . https://doi.org/10.1109/CSF.2019.00010
Timing-based side-channel attacks have matured from an academic exercise to a powerful attack vector in the hand of real-world adversaries. A widely deployed countermeausure against such attacks is to reduce the accuracy of the clocks that are availa
Autor:
Hanne Riis Nielson, Emilio Tuosto
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030223960
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::94884372d4052e9924d96dfe3f8da239
https://doi.org/10.1007/978-3-030-22397-7
https://doi.org/10.1007/978-3-030-22397-7