Sciweavers

253 search results - page 37 / 51
» Compositional Analysis of Authentication Protocols
Sort
View
IWIA
2005
IEEE
14 years 1 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
IJSN
2008
147views more  IJSN 2008»
13 years 7 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 25 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
CAV
2012
Springer
223views Hardware» more  CAV 2012»
11 years 10 months ago
Detecting Fair Non-termination in Multithreaded Programs
Abstract. We develop compositional analysis algorithms for detecting nontermination in multithreaded programs. Our analysis explores fair and ultimatelyperiodic executions—i.e., ...
Mohamed Faouzi Atig, Ahmed Bouajjani, Michael Emmi...
DAC
2007
ACM
13 years 11 months ago
Performance Analysis of FlexRay-based ECU Networks
It is now widely believed that FlexRay will emerge as the predominant protocol for in-vehicle automotive communication systems. As a result, there has been a lot of recent interes...
Andrei Hagiescu, Unmesh D. Bordoloi, Samarjit Chak...