Sciweavers

963 search results - page 54 / 193
» Formal Analysis of BPMN Models Using Event-B
Sort
View
CCS
2010
ACM
15 years 1 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
FMSD
2006
131views more  FMSD 2006»
15 years 1 months ago
Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude
This paper describes the application of the Real-Time Maude tool and the Maude formal methodology to the specification and analysis of the AER/NCA suite of active network multicast...
Peter Csaba Ölveczky, José Meseguer, C...
CSFW
2012
IEEE
13 years 3 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
STORYTELLING
2005
Springer
15 years 6 months ago
Formal Encoding of Drama Ontology
The goal of this research is to lay the foundations for a formal theory , that abstracts from the procedural and interactive aspects involved in the generation of dramatic content....
Rossana Damiano, Vincenzo Lombardo, Antonio Pizzo
FORMATS
2005
Springer
15 years 6 months ago
Diagonal Constraints in Timed Automata: Forward Analysis of Timed Systems
Timed automata (TA) are a widely used model for real-time systems. Several tools are dedicated to this model, and they mostly implement a forward analysis for checking reachability...
Patricia Bouyer, François Laroussinie, Pier...