Sciweavers

401 search results - page 30 / 81
» Formal Analysis of Meeting Protocols
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 10 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
JCS
2010
80views more  JCS 2010»
13 years 5 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
FMICS
2007
Springer
14 years 5 months ago
An Action/State-Based Model-Checking Approach for the Analysis of Communication Protocols for Service-Oriented Applications
Abstract. In this paper we present an action/state-based logical framework for the analysis and verification of complex systems, which relies on the definition of doubly labelled...
Maurice H. ter Beek, Alessandro Fantechi, Stefania...
TYPES
2004
Springer
14 years 4 months ago
A Machine-Checked Formalization of the Random Oracle Model
Abstract. Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowl...
Gilles Barthe, Sabrina Tarento
ENTCS
2006
146views more  ENTCS 2006»
13 years 10 months ago
Formalizing WSBPEL Business Processes Using Process Algebra
Industry standards for Web Service composition, such as WSBPEL, provide the notation and additional control mechanisms for the execution of business processes in Web Service colla...
Javier Cámara, Carlos Canal, Javier Cubo, A...