Sciweavers

4962 search results - page 669 / 993
» Stochastic Model Checking
Sort
View
117
Voted
ASWEC
2006
IEEE
15 years 8 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
127
Voted
APSEC
2005
IEEE
15 years 8 months ago
A Formal Semantics of Timed Activity Diagrams and its PROMELA Translation
The lack of a precise semantics for UML activity diagrams makes the reasoning on models constructed using such diagrams infeasible. However, such diagrams are widely used in domai...
Nicolas Guelfi, Amel Mammar
129
Voted
BPM
2005
Springer
101views Business» more  BPM 2005»
15 years 8 months ago
Service Retrieval Based on Behavioral Specifications and Quality Requirements
: The capability to easily find useful services becomes increasingly critical in several fields. In this paper we argue that, in many situations, the service discovery process shou...
Daniela Grigori, Verónika Peralta, Mokrane ...
88
Voted
BPM
2005
Springer
129views Business» more  BPM 2005»
15 years 8 months ago
Transforming BPEL to Petri Nets
We present a Petri net semantics for the Business Process Execution Language for Web Services (BPEL). Our semantics covers the standard behaviour of BPEL as well as the exceptional...
Sebastian Hinz, Karsten Schmidt 0004, Christian St...
EMSOFT
2005
Springer
15 years 8 months ago
Model-based analysis of distributed real-time embedded system composition
Key challenges in distributed real-time embedded (DRE) system developments include safe composition of system components and mapping the functional specifications onto the target...
Gabor Madl, Sherif Abdelwahed