Sciweavers

79 search results - page 2 / 16
» Analysis of the Security of BB84 by Model Checking
Sort
View
FM
2003
Springer
115views Formal Methods» more  FM 2003»
13 years 10 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
PLDI
2006
ACM
13 years 10 months ago
Combining type-based analysis and model checking for finding counterexamples against non-interference
Type systems for secure information flow are useful for efficiently checking that programs have secure information flow. They are, however, conservative, so that they often rej...
Hiroshi Unno, Naoki Kobayashi, Akinori Yonezawa
KBSE
2007
IEEE
13 years 11 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
13 years 10 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
CADE
2011
Springer
12 years 4 months ago
ASASP: Automated Symbolic Analysis of Security Policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative access control policies. The tool represents access policies and their administrative action...
Francesco Alberti, Alessandro Armando, Silvio Rani...