Sciweavers

2794 search results - page 49 / 559
» A New Architecture for Automated Modelling
Sort
View
ESOP
2005
Springer
15 years 4 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
NETWORKING
2004
15 years 16 days ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt
ETS
2002
IEEE
139views Hardware» more  ETS 2002»
14 years 11 months ago
Automated Tutorial and Assignment Assessment
Computer simulation is used extensively both as an educational tool and within industry. It can be employed as a means of developing a new process or system or as a means of exper...
Roger F. Browne
BPM
2005
Springer
99views Business» more  BPM 2005»
15 years 4 months ago
On Automating Networked Enterprise Management
With the new middleware IT technologies such as Web Services and peer-to-peer computing facilities, a Virtual Enterprise can be built easier achieving some problems of interoperabi...
Ustun Yildiz, Olivier Perrin, Claude Godart
CSFW
2008
IEEE
15 years 29 days ago
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus
We present a general technique for modeling remote electronic voting protocols in the applied pi-calculus and for automatically verifying their security. In the first part of this...
Michael Backes, Catalin Hritcu, Matteo Maffei