secure strategies
Recently Published Documents


TOTAL DOCUMENTS

8
(FIVE YEARS 1)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Yang Gao ◽  
◽  
Xia Yang ◽  
Wensheng Guo ◽  
Xiutai Lu

MILS partition scheduling module ensures isolation of data between different domains completely by enforcing secure strategies. Although small in size, it involves complicated data structures and algorithms that make monolithic verification of the scheduling module difficult using traditional verification logic (e.g., separation logic). In this paper, we simplify the verification task by dividing data representation and data operation into different layers and then to link them together by composing a series of abstraction layers. The layered method also supports function calls from higher implementation layers into lower abstraction layers, allowing us to ignore implementation details in the lower implementation layers. Using this methodology, we have verified a realistic MILS partition scheduling module that can schedule operating systems (Ubuntu 14.04, VxWorks 6.8 and RTEMS 11.0) located in different domains. The entire verification has been mechanized in the Coq Proof Assistant.


2018 ◽  
Vol 110 ◽  
pp. 58-70
Author(s):  
M. Iskakov ◽  
A. Iskakov ◽  
C. d'Aspremont
Keyword(s):  

2017 ◽  
Vol 78 (6) ◽  
pp. 1159-1172
Author(s):  
A. B. Iskakov ◽  
M. B. Iskakov
Keyword(s):  

2016 ◽  
Vol 77 (12) ◽  
pp. 2239-2248 ◽  
Author(s):  
A. B. Iskakov ◽  
M. B. Iskakov
Keyword(s):  

10.37236/4019 ◽  
2014 ◽  
Vol 21 (3) ◽  
Author(s):  
Colleen M. Swanson ◽  
Douglas R. Stinson

In the generalized Russian cards problem, we have a card deck $X$ of $n$ cards and three participants, Alice, Bob, and Cathy, dealt $a$, $b$, and $c$ cards, respectively. Once the cards are dealt, Alice and Bob wish to privately communicate their hands to each other via public announcements, without the advantage of a shared secret or public key infrastructure. Cathy, for her part, should remain ignorant of all but her own cards after Alice and Bob have made their announcements. Notions for Cathy's ignorance in the literature range from Cathy not learning the fate of any individual card with certainty (weak $1$-security) to not gaining any probabilistic advantage in guessing the fate of some set of $\delta$ cards (perfect $\delta$-security). As we demonstrate in this work, the generalized Russian cards problem has close ties to the field of combinatorial designs, on which we rely heavily, particularly for perfect security notions. Our main result establishes an equivalence between perfectly $\delta$-secure strategies and $(c+\delta)$-designs on $n$ points with block size $a$, when announcements are chosen uniformly at random from the set of possible announcements. We also provide construction methods and example solutions, including a construction that yields perfect $1$-security against Cathy when $c=2$. Drawing on our equivalence results, we are able to use a known combinatorial design to construct a strategy with $a=8$, $b=13$, and $c=3$ that is perfectly $2$-secure. Finally, we consider a variant of the problem that yields solutions that are easy to construct and optimal with respect to both the number of announcements and level of security achieved. Moreover, this is the first method obtaining weak $\delta$-security that allows Alice to hold an arbitrary number of cards and Cathy to hold a set of $c = \lfloor \frac{a-\delta}{2} \rfloor$ cards. Alternatively, the construction yields solutions for arbitrary $\delta$, $c$ and any $a \geq \delta + 2c$.


2012 ◽  
Vol 117 (1) ◽  
pp. 115-118 ◽  
Author(s):  
Mikhail Iskakov ◽  
Alexey Iskakov
Keyword(s):  

1993 ◽  
Vol 120 (1) ◽  
pp. 131-151 ◽  
Author(s):  
M. R. Hardy

AbstractIn this paper an asset/liability model is used to compare the quality of information available from a set of stochastic simulations with a traditional deterministic sensitivity test approach.The traditional approach applied to a range of variants of the basic model office fails to distinguish adequately very risky strategies from relatively secure strategies. The stochastic simulation method succeeds in ranking the various strategies considered into an intuitively satisfactory order of insolvency risk, as well as giving quantitative information on the relative probabilities of insolvency of different strategies and on the timing of potential solvency problems.


Sign in / Sign up

Export Citation Format

Share Document