Sciweavers

5255 search results - page 53 / 1051
» Formal Methods for Privacy
Sort
View
CSFW
2002
IEEE
14 years 3 months ago
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
We formalize aspects of the Kerberos 5 authentication protocol in the Multi-Set Rewriting formalism (MSR) on two levels of detail. The more detailed formalization reflects the in...
Frederick Butler, Iliano Cervesato, Aaron D. Jagga...
JUCS
2007
94views more  JUCS 2007»
13 years 10 months ago
Automated Formal Methods Enter the Mainstream
: This paper outlines the emergence of formal techniques, explaining why they were slow to take on an industrially acceptable form. The contemporary scene, in which formal techniqu...
John M. Rushby