Sciweavers

181 search results - page 20 / 37
» Automated Verification of UMLsec Models for Security Require...
Sort
View
82
Voted
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 2 days ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
105
Voted
INFORMATICALT
2006
93views more  INFORMATICALT 2006»
15 years 12 days ago
Identity Based Multisignatures
Abstract. This paper presents identity based serial and parallel multisignature schemes using bilinear pairings. Our serial multisignature scheme requires a forced verification at ...
Raju Gangishetti, M. Choudary Gorantla, Manik Lal ...
KI
2010
Springer
14 years 7 months ago
Differential Dynamic Logics
Hybrid systems are models for complex physical systems and are defined as dynamical systems with interacting discrete transitions and continuous evolutions along differential equa...
André Platzer
110
Voted
SIGCOMM
2010
ACM
15 years 19 days ago
capDL: a language for describing capability-based systems
Capabilities provide an access control model that can be used to construct systems where safety of protection can be precisely determined. However, in order to be certain of the s...
Ihor Kuz, Gerwin Klein, Corey Lewis, Adam Walker
89
Voted
FDL
2005
IEEE
15 years 6 months ago
Integrating Model-Checking with UML-based SoC Development
In order to address the complexities of SoC design, rigorous development methods and automated tools are required. This paper presents an approach to formal verification using mod...
Peter Green, Kinika Tasie-Amadi