Sciweavers

105 search results - page 8 / 21
» Apply Model Checking to Security Analysis in Trust Managemen...
Sort
View
GLOBECOM
2008
IEEE
15 years 3 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
FOSAD
2000
Springer
15 years 1 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
ICCD
2005
IEEE
124views Hardware» more  ICCD 2005»
15 years 3 months ago
Model Checking C Programs Using F-SOFT
— With the success of formal verification techniques like equivalence checking and model checking for hardware designs, there has been growing interest in applying such techniqu...
Franjo Ivancic, Ilya Shlyakhter, Aarti Gupta, Mala...
RE
2007
Springer
15 years 3 months ago
Secure and Dependable Patterns in Organizations: An Empirical Approach
Designing a secure and dependable system is not just a technical issue, it involves also a deep analysis of the organizational and the social environment in which the system will ...
Yudistira Asnar, Paolo Giorgini, Roberto Bonato, V...
ESORICS
2002
Springer
15 years 9 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz