Sciweavers

80 search results - page 8 / 16
» ifip 2009
Sort
View
IFIP
2009
Springer
13 years 7 months ago
A User Interface for a Game-Based Protocol Verification Tool
We present a platform that allows a protocol researcher to specify the sequence of games from an initial protocol to a protocol where the security property under consideration can ...
Peeter Laud, Ilja Tsahhirov
IFIP
2009
Springer
13 years 7 months ago
Consistency Analysis of Network Traffic Repositories
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Elmer Lastdrager, Aiko Pras
IFIP
2009
Springer
13 years 7 months ago
A Collaboration Pattern Model for Virtual Organisations
Collaboration, either inter or intra-organization is a critical business function that demands skills and knowledge spanning a wide range of domains including social, business and ...
Nikos Papageorgiou, Giannis Verginadis, Dimitris A...
IFIP
2009
Springer
13 years 7 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
IFIP
2009
Springer
13 years 7 months ago
How to Foresee and Capture the Effects of RFID Implementation
RFID technology is, according to both industry and academia, one of the most promising new technologies for improving logistics and manufacturing excellence this decade. This resea...
Kristin Hergot, Lars Skjelstad