Sciweavers

461 search results - page 34 / 93
» Developing security protocols by refinement
Sort
View
IEEEARES
2006
IEEE
14 years 1 months ago
DeDiSys Lite: An Environment for Evaluating Replication Protocols in Partitionable Distributed Object Systems
Distributed object systems for partitionable systems present a challenge, in that there is a trade-off between availability and consistency. Changes in one partition are not visib...
Stefan Beyer, Alexander Sanchez, Francesc D. Mu&nt...
AMAST
2008
Springer
13 years 9 months ago
Evolving Specification Engineering
Abstract. The motivation for this work is to support a natural separation of concerns during formal system development. In a developmentby-refinement context, we would like to be a...
Dusko Pavlovic, Peter Pepper, Douglas R. Smith
ESORICS
2010
Springer
13 years 9 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
INFOCOM
2006
IEEE
14 years 1 months ago
Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol
— The General Internet Signaling Transport (GIST) protocol is currently being developed as the base protocol component in the IETF Next Steps In Signaling (NSIS) protocol stack t...
Xiaoming Fu, Henning Schulzrinne, Hannes Tschofeni...
AINA
2011
IEEE
12 years 11 months ago
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence
—The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security po...
Julian Schütte, Stephan Heuser