Sciweavers

2687 search results - page 19 / 538
» Formal Analysis of PKCS
Sort
View
CSFW
2002
IEEE
14 years 3 months ago
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the in...
Frederick Butler, Iliano Cervesato, Aaron D. Jagga...
ICCS
2005
Springer
14 years 4 months ago
Using Formal Concept Analysis and Information Flow for Modelling and Sharing Common Semantics: Lessons Learnt and Emergent Issue
Abstract. We have been witnessing an explosion of user involvement in knowledge creation, publication and access both from within and between organisations. This is partly due to t...
Yannis Kalfoglou, W. Marco Schorlemmer
NORDSEC
2009
Springer
14 years 3 months ago
Formal Analysis of the Estonian Mobile-ID Protocol
In this paper, we report the results of the formal analysis performed on the Estonian Mobile-ID protocol (deployed since 2008), allowing citizens and permanent residents of Estonia...
Peeter Laud, Meelis Roos
ISOLA
2010
Springer
13 years 9 months ago
A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL
We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agree...
Anders P. Ravn, Jirí Srba, Saleem Vighio
CSE
2009
IEEE
14 years 5 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...