Sciweavers

274 search results - page 24 / 55
» Formal procedural security modeling and analysis
Sort
View
JALC
2006
87views more  JALC 2006»
13 years 7 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
PODS
2005
ACM
119views Database» more  PODS 2005»
14 years 8 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi
GLOBECOM
2008
IEEE
14 years 2 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
BMCBI
2010
178views more  BMCBI 2010»
13 years 8 months ago
Applications of a formal approach to decipher discrete genetic networks
Background: A growing demand for tools to assist the building and analysis of biological networks exists in systems biology. We argue that the use of a formal approach is relevant...
Fabien Corblin, Eric Fanchon, Laurent Trilling
NSDI
2008
13 years 10 months ago
Predicted and Observed User Behavior in the Weakest-link Security Game
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-maki...
Jens Grossklags, Nicolas Christin, John Chuang