Sciweavers

2794 search results - page 49 / 559
» A New Architecture for Automated Modelling
Sort
View
ESOP
2005
Springer
14 years 1 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
NETWORKING
2004
13 years 9 months ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt
ETS
2002
IEEE
139views Hardware» more  ETS 2002»
13 years 7 months ago
Automated Tutorial and Assignment Assessment
Computer simulation is used extensively both as an educational tool and within industry. It can be employed as a means of developing a new process or system or as a means of exper...
Roger F. Browne
BPM
2005
Springer
99views Business» more  BPM 2005»
14 years 1 months ago
On Automating Networked Enterprise Management
With the new middleware IT technologies such as Web Services and peer-to-peer computing facilities, a Virtual Enterprise can be built easier achieving some problems of interoperabi...
Ustun Yildiz, Olivier Perrin, Claude Godart
CSFW
2008
IEEE
13 years 9 months ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei