Sciweavers

53 search results - page 6 / 11
» Modeling and Analysis of Security Protocols Using Role Based...
Sort
View
HASE
1999
IEEE
13 years 12 months ago
Automatic Dependability Analysis for Supporting Design Decisions in UML
Even though a thorough system specification improves the quality of the design , it is not sufficient to guarantee that a system will satisfy its reliability targets. Within this ...
Andrea Bondavalli, Ivan Mura, István Majzik
SCN
2011
Springer
292views Communications» more  SCN 2011»
13 years 2 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
SPW
1999
Springer
13 years 11 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe
APN
2006
Springer
13 years 11 months ago
ArgoSPE: Model-Based Software Performance Engineering
Stochastic Petri nets (SPNs) have been proved useful for the quantitative analysis of systems. This paper introduces ArgoSPE, a tool for the performance evaluation of software syst...
Elena Gómez-Martínez, José Me...
SACMAT
2003
ACM
14 years 24 days ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka