Sciweavers

70 search results - page 10 / 14
» A Framework for Verifying Data-Centric Protocols
Sort
View
109
Voted
ICFEM
2010
Springer
14 years 10 months ago
Making the Right Cut in Model Checking Data-Intensive Timed Systems
Abstract. The success of industrial-scale model checkers such as Uppaal [3] or NuSMV [12] relies on the efficiency of their respective symbolic state space representations. While d...
Rüdiger Ehlers, Michael Gerke 0002, Hans-J&ou...
DAGSTUHL
2006
15 years 1 months ago
Choreography Conformance Checking: An Approach based on BPEL and Petri Nets
Abstract Recently, languages such as BPEL and CDL have been proposed to describe the way services can interact from a behavioral perspective. The emergence of these languages heral...
Wil M. P. van der Aalst, Marlon Dumas, Chun Ouyang...
ESORICS
2002
Springer
15 years 11 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
ICASSP
2011
IEEE
14 years 3 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
PODC
2010
ACM
15 years 3 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...