Sciweavers

449 search results - page 12 / 90
» Formal Modeling of Communication Protocols by Graph Transfor...
Sort
View
IFIP
2004
Springer
15 years 5 months ago
Complementing Computational Protocol Analysis with Formal Specifications
Abstract The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversa...
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
104
Voted
CSFW
2009
IEEE
15 years 6 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
15 years 6 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
JOT
2010
96views more  JOT 2010»
14 years 10 months ago
UML Profiles for Modeling Real-Time Communication Protocols
Validation of non-functional and functional properties of these protocols during the early stages of design and development is important to reduce cost resulting from protocol ano...
Barath Kumar, Jürgen Jasperneite
100
Voted
FMOODS
2006
15 years 1 months ago
Defining Object-Oriented Execution Semantics Using Graph Transformations
In this paper we describe an application of the theory of graph transformations to the practise of language design. In particular, we have defined the static and dynamic semantics ...
Harmen Kastenberg, Anneke Kleppe, Arend Rensink