Sciweavers

401 search results - page 44 / 81
» Formal Analysis of Meeting Protocols
Sort
View
CCS
2001
ACM
14 years 3 months ago
Events in security protocols
The events of a security protocol and their causal dependency can play an important role in the analysis of security properties. This insight underlies both strand spaces and the ...
Federico Crazzolara, Glynn Winskel
CCS
2007
ACM
14 years 5 months ago
A calculus of challenges and responses
er presents a novel approach for concisely abstracting authentication s and for subsequently analyzing those abstractions in a sound manner, i.e., deriving authentication guarante...
Michael Backes, Agostino Cortesi, Riccardo Focardi...
CSL
2010
Springer
13 years 12 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
CCS
2005
ACM
14 years 4 months ago
Provable anonymity
This paper provides a formal framework for the analysis of information hiding properties of anonymous communication protocols in terms of epistemic logic. The key ingredient is ou...
Flavio D. Garcia, Ichiro Hasuo, Wolter Pieters, Pe...
SMC
2007
IEEE
134views Control Systems» more  SMC 2007»
14 years 5 months ago
A Petri net-based approach to QoS-aware configuration for web services
: With the development of enterprise-wide and cross-enterprise application integration and interoperation towards web service, web service providers try to not only fulfill the fun...
PengCheng Xiong, Yushun Fan, MengChu Zhou