Sciweavers

106 search results - page 11 / 22
» Tools for Traceable Security Verification
Sort
View
AGENTS
2001
Springer
14 years 1 days ago
Automatically tracking and analyzing the behavior of live insect colonies
We introduce the study of live social insect colonies as a relevant and exciting domain for the development and application of multi-agent systems modeling tools. Social insects p...
Tucker R. Balch, Zia Khan, Manuela M. Veloso
CSFW
2009
IEEE
13 years 11 months ago
Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation
ProVerif is one of the most successful tools for cryptographic protocol analysis. However, dealing with algebraic properties of operators such as the exclusive OR (XOR) and Diffie-...
Ralf Küsters, Tomasz Truderung
ESORICS
2002
Springer
14 years 7 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
ACSAC
2008
IEEE
13 years 9 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu
JUCS
2007
88views more  JUCS 2007»
13 years 7 months ago
Internet Payment System: A New Payment System for Internet Transactions
: Payment systems need to address a number of security issues in order to be an effective and secure means of transferring payments across the Internet. To be accessible to a wider...
Zoran Djuric, Ognjen Maric, Dragan Gasevic