Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por José Bacelar Almeida

2011

Partial Derivative Automata Formalized in Coq

Autores
Almeida, JB; Moreira, N; Pereira, D; de Sousa, SM;

Publicação
IMPLEMENTATION AND APPLICATION OF AUTOMATA

Abstract
In this paper we present a computer assisted proof of the correctness of a partial derivative automata construction from a regular expression within the Coq proof assistant. Tins proof is part of a formalization of Kleene algebra and regular languages in Coq towards their usage in program certification.

2012

Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols

Autores
Almeida, JB; Barbosa, M; Bangerter, E; Barthe, G; Krenn, S; Beguelin, SZ;

Publicação
Proceedings of the ACM Conference on Computer and Communications Security

Abstract
Developers building cryptography into security-sensitive applications face a daunting task. Not only must they understand the security guarantees delivered by the constructions they choose, they must also implement and combine them correctly and efficiently. Cryptographic compilers free developers from this task by turning high-level specifications of security goals into efficient implementations. Yet, trusting such tools is hard as they rely on complex mathematical machinery and claim security properties that are subtle and difficult to verify. In this paper we present ZKCrypt, an optimizing cryptographic compiler achieving an unprecedented level of assurance without sacrificing practicality for a comprehensive class of cryptographic protocols, known as Zero-Knowledge Proofs of Knowledge. The pipeline of ZKCrypt integrates purpose-built verified compilers and verifying compilers producing formal proofs in the CertiCrypt framework. By combining the guarantees delivered by each stage, ZKCrypt provides assurance that the output implementation securely realizes the abstract proof goal given as input. We report on the main characteristics of ZKCrypt, highlight new definitions and concepts at its foundations, and illustrate its applicability through a representative example of an anonymous credential system. Copyright © 2012 ACM.

2004

Bounded version vectors

Autores
Almeida, JB; Almeida, PS; Baquero, C;

Publicação
DISTRIBUTED COMPUTING, PROCEEDINGS

Abstract
Version vectors play a central role in update tracking under optimistic distributed systems, allowing the detection of obsolete or inconsistent versions of replicated data. Version vectors do not have a bounded representation; they are based on integer counters that grow indefinitely as updates occur. Existing approaches to this problem are scarce; the mechanisms proposed are either unbounded or operate only under specific settings. This paper examines version vectors as a mechanism for data causality tracking and clarifies their role with respect to vector clocks. Then, it introduces bounded stamps and proves them to be a correct alternative to integer counters in version vectors. The resulting mechanism, bounded version vectors, represents the first bounded solution to data causality tracking between replicas subject to local updates and pairwise symmetrical synchronization.

2008

Deriving Sorting Algorithms

Autores
Almeida, JoseBacelar; Pinto, JorgeSousa;

Publicação
CoRR

Abstract

2008

Token-passing Nets for Functional Languages

Autores
Almeida, JB; Pinto, JS; Vilaça, M;

Publicação
Electr. Notes Theor. Comput. Sci.

Abstract
Token-passing nets were proposed by Sinot as a simple mechanism for encoding evaluation strategies for the ?-calculus in interaction nets. This work extends token-passing nets to cover a typed functional language equipped with structured types and unrestricted recursion. The resulting interaction system is derived systematically from the chosen big-step operational semantics. Along the way, we actually characterize and discuss several design decisions of token-passing nets and extend them in order to achieve simpler interaction net systems with a higher degree of embedded parallelism.

2011

Rigorous Software Development - An Introduction to Program Verification

Autores
Almeida, JB; Frade, MJ; Pinto, JS; Sousa, SMd;

Publicação
Undergraduate Topics in Computer Science

Abstract

  • 6
  • 9