Sciweavers

103 search results - page 8 / 21
» Verified Interoperable Implementations of Security Protocols
Sort
View
EMSOFT
2005
Springer
14 years 1 months ago
Deeply embedded XML communication: towards an interoperable and seamless world
Current consumer electronics devices do not interoperate and are hard to use. Devices use proprietary, device-specific and inflexible protocols. Resources across device classes, s...
Johannes Helander
APNOMS
2006
Springer
13 years 11 months ago
Performance Improvement Methods for NETCONF-Based Configuration Management
IETF's NETCONF WG has taken efforts in standardizing configuration management protocol, which allows high interoperability of configuration management. In addition to interope...
Sun-Mi Yoo, Hong-Taek Ju, James W. Hong
LOPSTR
2001
Springer
13 years 12 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
EUROPKI
2008
Springer
13 years 9 months ago
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
Real world healthcare systems are generally large and overly complex systems. Designing privacy-friendly protocols for such systems is a challenging task. In this paper we present ...
Bart De Decker, Mohamed Layouni, Hans Vangheluwe, ...