This paper presents a theoretical and practical framework for constructing and reasoning about mobile agents. The framework is formulated as a process calculus and has two contrib...
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
In the field of real-time control applications, validation relies on a precise knowledge of the temporal characteristics of the used data such as delays and loss rates. These data...
Business Process Verification (BPV) is increasingly important in emerging BPM Systems. Although many approaches related to BPV exist, the gap between formal models defined in previ...
While executing a process, many decisions are taken at its various decision points for selecting paths. There is a need for understanding and analyzing on various paths that emana...