Sciweavers

70 search results - page 10 / 14
» A Framework for Verifying Data-Centric Protocols
Sort
View
ICFEM
2010
Springer
14 years 8 months ago
Making the Right Cut in Model Checking Data-Intensive Timed Systems
Abstract. The success of industrial-scale model checkers such as Uppaal [3] or NuSMV [12] relies on the efficiency of their respective symbolic state space representations. While d...
Rüdiger Ehlers, Michael Gerke 0002, Hans-J&ou...
DAGSTUHL
2006
14 years 11 months ago
Choreography Conformance Checking: An Approach based on BPEL and Petri Nets
Abstract Recently, languages such as BPEL and CDL have been proposed to describe the way services can interact from a behavioral perspective. The emergence of these languages heral...
Wil M. P. van der Aalst, Marlon Dumas, Chun Ouyang...
ESORICS
2002
Springer
15 years 9 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
ICASSP
2011
IEEE
14 years 1 months ago
Vulnerability of insens to denial of service attacks
Wireless Sensor Networks (WSNs) may be deployed in hostile or inaccessible environments and are often unattended. In these conditions securing a WSN against malicious attacks is a...
Kashif Saghar, David Kendall, Ahmed Bouridane
PODC
2010
ACM
15 years 1 months ago
Brief announcement: anonymity and trust in distributed systems
In this paper, we present a framework for achieving anonymity and trust, two seemingly contradictory properties, in distributed systems. Our approach builds on webs of trust, a we...
Michael Backes, Stefan Lorenz, Matteo Maffei, Kim ...