Sciweavers

671 search results - page 31 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
131
Voted
ISADS
1999
IEEE
15 years 8 months ago
A Secure Key Registration System based on Proactive Secret-Sharing Scheme
We designed a secure key registration system based on the proactive secret-sharing scheme. A user can register important data such as a session key to a distributed system in a (t...
Masayuki Numao
217
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Filter Based Directory Replication: Algorithms and Performance
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Apurva Kumar
147
Voted
SERP
2007
15 years 5 months ago
Towards Aspect-oriented Model-driven Code Generation in the Formal Design Analysis Framework
Model driven code generation has been investigated in traditional and object-oriented design paradigms; significant progress has been made. It offers many advantages including the...
Kendra Cooper, Lirong Dai, Sergiu Dascalu, Nehal M...
RSP
2007
IEEE
139views Control Systems» more  RSP 2007»
15 years 10 months ago
Verifying Distributed Protocols using MSC-Assertions, Run-time Monitoring, and Automatic Test Generation
This paper addresses the need for formal specification and runtime verification of system-level requirements of distributed reactive systems. It describes a formalism for specifyi...
Doron Drusinsky, Man-tak Shing
155
Voted
CCS
2008
ACM
15 years 5 months ago
Secure neighbor discovery in wireless networks: formal investigation of possibility
Wireless communication enables a broad spectrum of applications, ranging from commodity to tactical systems. Neighbor discovery (ND), that is, determining which devices are within...
Marcin Poturalski, Panos Papadimitratos, Jean-Pier...