Sciweavers

671 search results - page 31 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
ISADS
1999
IEEE
15 years 2 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
ICDCS
2005
IEEE
15 years 3 months ago
Filter Based Directory Replication: Algorithms and Performance
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Apurva Kumar
SERP
2007
14 years 11 months ago
Towards Aspect-oriented Model-driven Code Generation in the Formal Design Analysis Framework
Model driven code generation has been investigated in traditional and object-oriented design paradigms; significant progress has been made. It offers many advantages including the...
Kendra Cooper, Lirong Dai, Sergiu Dascalu, Nehal M...
RSP
2007
IEEE
139views Control Systems» more  RSP 2007»
15 years 4 months ago
Verifying Distributed Protocols using MSC-Assertions, Run-time Monitoring, and Automatic Test Generation
This paper addresses the need for formal specification and runtime verification of system-level requirements of distributed reactive systems. It describes a formalism for specifyi...
Doron Drusinsky, Man-tak Shing
CCS
2008
ACM
14 years 11 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...