Sciweavers

3451 search results - page 70 / 691
» Collaborative attack modeling
Sort
View
ACSC
2007
IEEE
14 years 1 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
JAR
2006
107views more  JAR 2006»
13 years 9 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy
GCC
2005
Springer
14 years 2 months ago
Collaborating Semantic Link Network with Resource Space Model
The Semantic Link Network model SLN and Resource Space Model RSM are semantic models proposed separately for effectively specifying and managing versatile resources across the Inte...
Yunpeng Xing, Jie Liu, Xiaoping Sun, Erlin Yao
AIM
2006
13 years 10 months ago
Collaborative information system design
: This article deals with enterprise interoperability in order to propose lines of research about information system design in a collaborative context. The static and dynamic dimen...
Frédérick Bénaben, Jihed Touz...
ASWEC
2006
IEEE
14 years 3 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge