Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
: This paper presents a process for the stepwise refinement of safety code assertions from identified system hazards. The code assertions are intended for use in system safety veri...
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
Business processes involve interactions among autonomous partners. We propose that these interactions be specified modularly as protocols. Protocols can be published, enabling imp...