Sciweavers

11 search results - page 2 / 3
» Modelling and verifying key-exchange protocols using CSP and...
Sort
View
ZUM
1998
Springer
111views Formal Methods» more  ZUM 1998»
13 years 9 months ago
Combining Specification Techniques for Processes, Data and Time
Abstract. We present a new combination CSP-OZ-DC of three well researched formal techniques for the specification of processes, data and time: CSP [17], Object-Z [36], and Duration...
Ernst-Rüdiger Olderog
FSEN
2009
Springer
13 years 9 months ago
Specification and Validation of Behavioural Protocols in the rCOS Modeler
The rCOS modeler implements the requirements modelling phase of a model driven component-based software engineering process. Components are specified in rCOS, a relational calculus...
Zhenbang Chen, Charles Morisset, Volker Stolz
CSFW
2002
IEEE
13 years 10 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
COMPSAC
2007
IEEE
13 years 5 months ago
A Connector-Centric Approach to Aspect-Oriented Software Evolution
Lose sight of the existence of system crosscutting concerns, e.g. safety and quality etc, often causes the system hard to maintain and evolve according to the changing environment...
Yiming Lau, Wenyun Zhao, Xin Peng, Shan Tang
CSFW
2005
IEEE
13 years 11 months ago
Game-Based Analysis of Denial-of-Service Prevention Protocols
Availability is a critical issue in modern distributed systems. While many techniques and protocols for preventing denial of service (DoS) attacks have been proposed and deployed ...
Ajay Mahimkar, Vitaly Shmatikov