Sciweavers

537 search results - page 41 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
CAISE
2009
Springer
14 years 2 months ago
A Goal Modeling Framework for Self-contextualizable Software
Self-contextualizability refers to the system ability to autonomously adapt its behaviour to context in order to maintain its objectives satisfied. In this paper, we propose a mod...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
FC
2010
Springer
169views Cryptology» more  FC 2010»
13 years 11 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
CCS
2008
ACM
13 years 9 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
IAT
2009
IEEE
14 years 2 months ago
Agent-Based Security System for User Verification
—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
SPIN
2007
Springer
14 years 1 months ago
C.OPEN and ANNOTATOR: Tools for On-the-Fly Model Checking C Programs
This paper describes a set of verification components that open the way to perform on-the-fly software model checking with the Cadp toolbox, originally designed for verifying the...
María-del-Mar Gallardo, Christophe Joubert,...