Sciweavers

276 search results - page 27 / 56
» Model Checking Groupware Protocols
Sort
View
ICDCS
2007
IEEE
14 years 5 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
CAISE
2006
Springer
14 years 2 months ago
Using Process Mining to Analyze and Improve Process Flexibility
Abstract. Contemporary information systems struggle with the requirement to provide flexibility and process support while still enforcing some degree of control. Workflow managemen...
Wil M. P. van der Aalst, Christian W. Günther...
ASIAN
2009
Springer
334views Algorithms» more  ASIAN 2009»
13 years 11 months ago
A Dolev-Yao Model for Zero Knowledge
In cryptographic protocols, zero knowledge proofs are employed for a principal A to communicate some non-trivial information t to B while at the same time ensuring that B cannot de...
Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh
FORTE
2003
14 years 18 hour ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson
DATE
2003
IEEE
98views Hardware» more  DATE 2003»
14 years 4 months ago
Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol
System-on-chip (SoC) designs use bus protocols for high performance data transfer among the Intellectual Property (IP) cores. These protocols incorporate advanced features such as...
Abhik Roychoudhury, Tulika Mitra, S. R. Karri