Sciweavers

1432 search results - page 20 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
TIT
2008
187views more  TIT 2008»
14 years 9 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer
FASE
2007
Springer
15 years 3 months ago
Testing Scenario-Based Models
The play-in/play-out approach suggests a new paradigm for system development using scenario-based requirements. It allows the user to develop a high level scenario-based model of t...
Hillel Kugler, Michael J. Stern, E. Jane Albert Hu...
SAM
2004
151views Hardware» more  SAM 2004»
14 years 10 months ago
Checking Secrecy by Means of Partial Order Reduction
We propose a partial order reduction for model checking security protocols for the secrecy property. Based on this reduction we develop an automatic tool that can check security pr...
Cas J. F. Cremers, Sjouke Mauw
WSC
1997
14 years 10 months ago
Requirements for Transitioning Business Process Simulation Models to Real-Time Operational Systems
The value of modeling and simulating business processes has recently received increased attention with the interest in business process re-engineering (BPR). Many re-engineering p...
Peter Floss
AAMAS
2007
Springer
14 years 9 months ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh