Sciweavers

180 search results - page 3 / 36
» Verifying Security Properties of Cryptoprotocols: A Novel Ap...
Sort
View
ECR
2006
81views more  ECR 2006»
13 years 9 months ago
Reputation management and signature delegation: A distributed approach
In this paper, we present a novel protocol, called Distributed Signcryption with Verifiable Partial Signature (DiSigncryption) protocol, to allow an agent owner to securely distrib...
Omaima Bamasak, Ning Zhang
ESORICS
2010
Springer
13 years 9 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
KBSE
2005
IEEE
14 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
ICSOC
2007
Springer
14 years 3 months ago
Verifying Temporal and Epistemic Properties of Web Service Compositions
Model checking Web service behaviour has remained limited to checking safety and liveness properties. However when viewed as a multi agent system, the system composition can be ana...
Alessio Lomuscio, Hongyang Qu, Marek J. Sergot, Mo...
ACSAC
2008
IEEE
13 years 11 months ago
Assessing Quality of Policy Properties in Verification of Access Control Policies
Access control policies are often specified in declarative languages. In this paper, we propose a novel approach, called mutation verification, to assess the quality of properties...
Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu