Sciweavers

274 search results - page 4 / 55
» Formal procedural security modeling and analysis
Sort
View
102
Voted
CCS
2005
ACM
15 years 3 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi
83
Voted
FROCOS
2007
Springer
15 years 4 months ago
Towards an Automatic Analysis of Web Service Security
Web services send and receive messages in XML syntax with some parts hashed, encrypted or signed, according to the WS-Security standard. In this paper we introduce a model to forma...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...
64
Voted
FM
2003
Springer
115views Formal Methods» more  FM 2003»
15 years 3 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
82
Voted
IFIP
2010
Springer
14 years 5 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
88
Voted
WSC
1996
14 years 11 months ago
Experimental Evaluation of Confidence Interval Procedures in Sequential Steady-State Simulation
Sequential analysis of simulation output is generally accepted as the most efficient way for securing representativeness of samples of collected observations. In this scenario a s...
Donald C. McNickle, Krzysztof Pawlikowski, Gregory...