Sciweavers

449 search results - page 65 / 90
» Formal Modeling of Communication Protocols by Graph Transfor...
Sort
View
FSTTCS
2003
Springer
15 years 6 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
ISCA
2006
IEEE
158views Hardware» more  ISCA 2006»
15 years 7 months ago
Memory Model = Instruction Reordering + Store Atomicity
We present a novel framework for defining memory models in terms of two properties: thread-local Instruction Reordering axioms and Store Atomicity, which describes inter-thread c...
Arvind, Jan-Willem Maessen
SOSE
2008
IEEE
15 years 7 months ago
Precise Steps for Choreography Modeling for SOA Validation and Verification
Service-oriented architecture (SOA) enables organizations to transform their existing IT infrastructure into a more flexible business process platform.. In this architecture, deco...
Sebastian Wieczorek, Andreas Roth, Alin Stefanescu...
SIGSOFT
2007
ACM
16 years 2 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
ESORICS
2009
Springer
16 years 2 months ago
Towards a Theory of Accountability and Audit
Accountability mechanisms, which rely on after-the-fact verification, are an attractive means to enforce authorization policies. In this paper, we describe an operational model of ...
Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, Jam...