Sciweavers

126 search results - page 2 / 26
» A Model Checking Approach to Protocol Conversion
Sort
View
IEEECIT
2005
IEEE
13 years 11 months ago
Web Service Interactions: Analysis and Design
Abstract The conversation model captures interactions among the components of a composite web service. A conversation is the global sequence of messages exchanged among the compone...
Jianwen Su
VLSID
2008
IEEE
122views VLSI» more  VLSID 2008»
14 years 5 months ago
A Module Checking Based Converter Synthesis Approach for SoCs
Protocol conversion involves the use of a converter to control communication between two or more protocols such that desired system-level specifications can be satisfied. We invest...
Roopak Sinha, Partha S. Roop, Samik Basu
CSFW
2007
IEEE
13 years 11 months ago
LTL Model Checking for Security Protocols
Most model checking techniques for security protocols make a number of simplifying assumptions on the protocol and/or on its execution environment that prevent their applicability...
Alessandro Armando, Roberto Carbone, Luca Compagna
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 5 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...