{"id":"https://openalex.org/W4405181800","doi":"https://doi.org/10.1145/3658644.3690303","title":"Verifiable Security Policies for Distributed Systems","display_name":"Verifiable Security Policies for Distributed Systems","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405181800","doi":"https://doi.org/10.1145/3658644.3690303"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690303","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690303","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690303","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690303","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085816785","display_name":"Felix A. Wolf","orcid":"https://orcid.org/0000-0002-8573-2387"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Felix A. Wolf","raw_affiliation_strings":["Department of Computer Science, ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073853337","display_name":"P\u00e9ter M\u00fcller","orcid":"https://orcid.org/0000-0001-7001-2566"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Peter M\u00fcller","raw_affiliation_strings":["Department of Computer Science, ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085816785"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":0.3626,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69689181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"4","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8654590845108032},{"id":"https://openalex.org/keywords/hol","display_name":"HOL","score":0.7805742025375366},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6366757154464722},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5740056037902832},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.554004430770874},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5523383617401123},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5060984492301941},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.49570000171661377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4485779404640198},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.43612736463546753},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37463071942329407}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8654590845108032},{"id":"https://openalex.org/C17435882","wikidata":"https://www.wikidata.org/wiki/Q17030435","display_name":"HOL","level":2,"score":0.7805742025375366},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6366757154464722},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5740056037902832},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.554004430770874},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5523383617401123},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5060984492301941},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.49570000171661377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4485779404640198},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.43612736463546753},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37463071942329407},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3690303","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690303","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690303","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690303","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690303","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690303","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405181800.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W1522079290","https://openalex.org/W1522146952","https://openalex.org/W1604195593","https://openalex.org/W1999056706","https://openalex.org/W2036463966","https://openalex.org/W2074285438","https://openalex.org/W2097365905","https://openalex.org/W2097833793","https://openalex.org/W2104658241","https://openalex.org/W2106226772","https://openalex.org/W2108887121","https://openalex.org/W2116236474","https://openalex.org/W2118198367","https://openalex.org/W2126469755","https://openalex.org/W2137628566","https://openalex.org/W2145846275","https://openalex.org/W2162755110","https://openalex.org/W2168686464","https://openalex.org/W2318327664","https://openalex.org/W2990205826","https://openalex.org/W2995573473","https://openalex.org/W3047136290","https://openalex.org/W4285195112","https://openalex.org/W4290442553","https://openalex.org/W4312803128","https://openalex.org/W4362677076","https://openalex.org/W4385679766","https://openalex.org/W6949368672"],"related_works":["https://openalex.org/W2585743557","https://openalex.org/W1594958113","https://openalex.org/W3193153727","https://openalex.org/W2477568018","https://openalex.org/W43811100","https://openalex.org/W2166178773","https://openalex.org/W2973427087","https://openalex.org/W1482720120","https://openalex.org/W1519028982","https://openalex.org/W93453024"],"abstract_inverted_index":{"In":[0],"the":[1,10,42,56,71,114],"context":[2],"of":[3,14,46,74,113],"secure":[4],"information":[5],"flow,":[6],"security":[7,47],"policies":[8,48,67,123],"express":[9],"classification":[11],"and":[12,30,44,87,126],"declassification":[13],"data.":[15],"Existing":[16],"policy":[17],"frameworks":[18],"are":[19,68,124],"tightly":[20],"linked":[21],"to":[22,82,88,131],"a":[23,39,60,94],"programming":[24],"language,":[25],"which":[26],"limits":[27],"their":[28],"flexibility":[29],"complicates":[31],"reasoning,":[32],"for":[33,41,49],"instance,":[34],"during":[35],"audits.":[36],"We":[37,79,97],"present":[38,80],"framework":[40],"specification":[43],"verification":[45,100,128],"distributed":[50],"systems,":[51],"where":[52],"attackers":[53],"may":[54],"observe":[55],"I/O":[57,72],"performed":[58],"by":[59],"program,":[61],"but":[62],"not":[63],"its":[64],"memory.":[65],"Our":[66],"expressed":[69],"over":[70],"behaviors":[73],"programs":[75],"and,":[76],"thereby,":[77],"language-agnostic.":[78],"techniques":[81,101],"reason":[83],"formally":[84],"about":[85],"policies,":[86],"verify":[89],"that":[90,121,127],"an":[91,111],"implementation":[92,112],"satisfies":[93],"given":[95],"policy.":[96],"formalize":[98],"these":[99],"in":[102],"Isabelle/HOL.":[103],"An":[104],"evaluation":[105],"on":[106],"several":[107],"case":[108],"studies,":[109],"including":[110],"WireGuard":[115],"VPN":[116],"key":[117],"exchange":[118],"protocol,":[119],"demonstrates":[120],"our":[122],"expressive,":[125],"is":[129],"amenable":[130],"SMT-based":[132],"verification.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
