Sciweavers

461 search results - page 1 / 93
» Developing security protocols by refinement
Sort
View
108
Voted
CCS
2010
ACM
14 years 8 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
65
Voted
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 1 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
CSFW
2004
IEEE
15 years 2 months ago
Abstraction and Refinement in Protocol Derivation
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
90
Voted
FAC
2008
67views more  FAC 2008»
14 years 10 months ago
Specification, proof, and model checking of the Mondex electronic purse using RAISE
This paper describes how the communication protocol of Mondex electronic purses can be specified and verified against desired security properties. The specification is developed by...
Chris George, Anne Elisabeth Haxthausen
67
Voted
COMPSEC
2010
142views more  COMPSEC 2010»
14 years 7 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto