Sciweavers

3751 search results - page 25 / 751
» Events in security protocols
Sort
View
STTT
2010
113views more  STTT 2010»
13 years 2 months ago
Proved development of the real-time properties of the IEEE 1394 Root Contention Protocol with the event-B method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm
CIIT
2004
13 years 9 months ago
Analysis and improvements of the eventing protocol for universal plug and play
UPnP is a widely-spread connectivity standard, which allows networked devices to cooperate in an autonomous fashion by using functionality found on the network. In this article we...
Y. Mazuryk, Johan J. Lukkien
ISOLA
2007
Springer
14 years 1 months ago
Proved Development of the Real-Time Properties of the IEEE 1394 Root Contention Protocol with the Event B Method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm, Dominique Cansell
SIGSOFT
2004
ACM
14 years 8 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
IASTEDSEA
2004
13 years 9 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao