Sciweavers

537 search results - page 6 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
SIGPLAN
2008
13 years 7 months ago
Verified enforcement of stateful information release policies
Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new a...
Nikhil Swamy, Michael Hicks
TPHOL
2003
IEEE
14 years 22 days ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
SEFM
2009
IEEE
14 years 2 months ago
An Automated Approach to Verifying Diagnosability in Multi-agent Systems
—This paper addresses the issue of guaranteeing the correctness of fault diagnosis mechanisms in multi-agent systems. We propose an automated approach to verifying the property o...
Jonathan Ezekiel, Alessio Lomuscio
CSSE
2008
IEEE
14 years 1 months ago
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
Abstract: The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, securit...
Prabhu Shankar Kaliappan, Hartmut Koenig, Vishnu K...
ATAL
2008
Springer
13 years 9 months ago
A flexible framework for verifying agent programs
There is an increasing number of agent-oriented programming languages that have working interpreters and platforms, with significant progress in the quality of such platforms over...
Louise A. Dennis, Berndt Farwer, Rafael H. Bordini...