Sciweavers

125 search results - page 7 / 25
» Integrating Formal Analysis and Design to Preserve Security ...
Sort
View
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
ENTCS
2006
137views more  ENTCS 2006»
13 years 7 months ago
Automated Security Protocol Analysis With the AVISPA Tool
The AVISPA Tool is a push-button tool for the Automated Validation of Internet Security Protocols and Applications. It provides a modular and expressive formal language for specif...
Luca Viganò
IRI
2003
IEEE
14 years 27 days ago
A Formal Framework for Design Component Contracts
– Building large software systems out of existing software components can save time and cost. These software components range from architectural and design components to binary c...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
ISSE
2010
13 years 6 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
ESORICS
2009
Springer
14 years 8 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao