Sciweavers

325 search results - page 16 / 65
» Concurrent Composition of Secure Protocols in the Timing Mod...
Sort
View
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 8 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CSFW
2009
IEEE
14 years 3 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
ICEBE
2005
IEEE
135views Business» more  ICEBE 2005»
14 years 2 months ago
GridPML: A Process Modeling Language and History Capture System for Grid Service Composition
This paper presents a process modeling language known as the GridPML for the composition of Grid Services. The GridPML is an XML-based language that supports basic control flow co...
Hua Ma, Susan Darling Urban, Yang Xiao, Suzanne W....
ACSD
2008
IEEE
107views Hardware» more  ACSD 2008»
13 years 10 months ago
Discrete real-time and stochastic-time process algebra for performance analysis of distributed systems
We present a process algebra with conditionally distributed discrete-time delays and generally-distributed stochastic delays. The treatment allows for expansion laws for the paral...
Jasen Markovski, Erik P. de Vink
FSTTCS
2009
Springer
14 years 3 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...