Sciweavers

276 search results - page 17 / 56
» Model Checking Groupware Protocols
Sort
View
FMCAD
2008
Springer
13 years 12 months ago
Automatic Non-Interference Lemmas for Parameterized Model Checking
Parameterized model checking refers to any method that extends traditional, finite-state model checking to handle systems arbitrary number of processes. One popular approach to thi...
Jesse D. Bingham
FORMATS
2003
Springer
14 years 3 months ago
Discrete-Time Rewards Model-Checked
Abstract. This paper presents a model-checking approach for analyzing discrete-time Markov reward models. For this purpose, the temporal logic probabilistic CTL is extended with re...
Suzana Andova, Holger Hermanns, Joost-Pieter Katoe...
ASWEC
2006
IEEE
14 years 4 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
SEFM
2007
IEEE
14 years 4 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
SAINT
2002
IEEE
14 years 3 months ago
Internet Mail Transfer and Check System Based on Intelligence Mobile Agents
The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today’s Internet world, but there are many dark clouds at the edge of the sunshin...
Li Cheng, Wang Weinong