Sciweavers

293 search results - page 43 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
EMSOFT
2009
Springer
14 years 2 months ago
Analytic real-time analysis and timed automata: a hybrid method for analyzing embedded real-time systems
This paper advocates a strict compositional and hybrid approach for obtaining key (performance) metrics of embedded At its core the developed methodology abstracts system componen...
Kai Lampka, Simon Perathoner, Lothar Thiele
JCS
2006
157views more  JCS 2006»
13 years 7 months ago
Analysis of probabilistic contract signing
We present three case studies, investigating the use of probabilistic model checking to automatically analyse properties of probabilistic contract signing protocols. We use the pr...
Gethin Norman, Vitaly Shmatikov
WWW
2003
ACM
14 years 8 months ago
Conversation specification: a new approach to design and analysis of e-service composition
This paper introduces a framework for modeling and specifying the global behavior of e-service compositions. Under this framework, peers (individual e-services) communicate throug...
Tevfik Bultan, Xiang Fu, Richard Hull, Jianwen Su
STTT
2008
103views more  STTT 2008»
13 years 7 months ago
Model-based development of a course of action scheduling tool
Abstract. This paper shows how a formal method in the form of Coloured Petri Nets (CPNs) and the supporting CPN Tools have been used in the development of the Course of Action Sche...
Lars Michael Kristensen, Peter Mechlenborg, Lin Zh...
IPOM
2007
Springer
14 years 1 months ago
Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems
Abstract. On the inter-domain Internet today, the address prefix origin in our BGP operations has become a major security concern. This critical problem can be stated simply as ...
Shih-Ming Tseng, Ke Zhang, Shyhtsun Felix Wu, Kwan...