Sciweavers

4962 search results - page 711 / 993
» Stochastic Model Checking
Sort
View
119
Voted
ICALP
2001
Springer
15 years 6 months ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
UML
2001
Springer
15 years 6 months ago
An Execution Algorithm for UML Activity Graphs
We present a real-time execution semantics for UML activity graphs that is intended for workflow modelling. The semantics is defined in terms of execution algorithms that define...
Rik Eshuis, Roel Wieringa
UML
2001
Springer
15 years 6 months ago
A Proposal for a Lightweight Rigorous UML-Based Development Method for Reliable Systems
Abstract: A lightweight UML-based software development method for building reliable software systems is proposed. It attempts to combine the coding emphasis of Extreme Programming ...
Richard F. Paige, Jonathan S. Ostroff
168
Voted
CSFW
2000
IEEE
15 years 6 months ago
Information Flow Analysis in a Discrete-Time Process Algebra
Some of the non interference properties studied in [4, 6, 18] for information flow analysis in computer systems, notably Æ , are reformulated here in a realtime setting. This is...
Riccardo Focardi, Roberto Gorrieri, Fabio Martinel...
AMAST
2000
Springer
15 years 6 months ago
A New Logic for Electronic Commerce Protocols
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
Kamel Adi, Mourad Debbabi, Mohamed Mejri