Sciweavers

CCS
2010
ACM
13 years 3 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
FAC
2008
67views more  FAC 2008»
13 years 5 months ago
Specification, proof, and model checking of the Mondex electronic purse using RAISE
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired security properties. The specification is developed by...
Chris George, Anne Elisabeth Haxthausen
ICCAD
2007
IEEE
165views Hardware» more  ICCAD 2007»
13 years 9 months ago
Automated refinement checking of concurrent systems
Stepwise refinement is at the core of many approaches to synthesis and optimization of hardware and software systems. For instance, it can be used to build a synthesis approach for...
Sudipta Kundu, Sorin Lerner, Rajesh Gupta
RE
2005
Springer
13 years 10 months ago
CoCA: A Composition-Centric Approach to Requirements Engineering
In this paper we discuss how mutual influences (e.g. conflicts) of different stakeholder concerns can be detected and reasoned about through composition and stepwise refinement. S...
Ruzanna Chitchyan, Ian Sommerville, Awais Rashid