Sciweavers

623 search results - page 44 / 125
» Declarative Network Verification
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 3 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
ICC
2007
IEEE
14 years 3 months ago
On the Verification of the Gravity Model Used for Mobility Modeling
— Gravity model used to model transport flow has proven invaluable in urban planning. Some recent work has proposed to use gravity model to predict user movements in cellular net...
Yong Huat Chew, Shinobu Nanba, Peng Keong Tham, Bo...
CSFW
2009
IEEE
14 years 20 days ago
Cryptographic Protocol Synthesis and Verification for Multiparty Sessions
We present the design and implementation of a compiler that, given high-level multiparty session descriptions, generates custom cryptographic protocols. Our sessions specify pre-a...
Karthikeyan Bhargavan, Ricardo Corin, Pierre-Malo ...
ISSA
2004
13 years 10 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
POPL
2004
ACM
14 years 9 months ago
A bisimulation for dynamic sealing
We define seal, an untyped call-by-value -calculus with primitives for protecting abstract data by sealing, and develop a bisimulation proof method that is sound and complete with...
Eijiro Sumii, Benjamin C. Pierce