Sciweavers

461 search results - page 8 / 93
» Developing security protocols by refinement
Sort
View
FSTTCS
2007
Springer
14 years 1 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
ENTCS
2006
145views more  ENTCS 2006»
13 years 7 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
SAFECOMP
1998
Springer
13 years 11 months ago
Refinement of Safety-Related Hazards into Verifiable Code Assertions
: This paper presents a process for the stepwise refinement of safety code assertions from identified system hazards. The code assertions are intended for use in system safety veri...
Ken Wong, Jeff Joyce
ACSAC
2008
IEEE
14 years 2 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
WWW
2004
ACM
14 years 8 months ago
A semantic approach for designing business protocols
Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, enabling imp...
Ashok U. Mallya, Munindar P. Singh