Sciweavers

12981 search results - page 318 / 2597
» Model Checking (Abstract)
Sort
View
SAINT
2002
IEEE
15 years 8 months ago
Internet Mail Transfer and Check System Based on Intelligence Mobile Agents
The Simple Mail Transfer Protocol (SMTP) based E-mail system is the most popular application in today’s Internet world, but there are many dark clouds at the edge of the sunshin...
Li Cheng, Wang Weinong
155
Voted
APSEC
2009
IEEE
15 years 1 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
ESORICS
2008
Springer
15 years 5 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu
RTCSA
1999
IEEE
15 years 8 months ago
Scheduling a Steel Plant with Timed Automata
Scheduling in an environment with constraints of many different types is known to be a hard problem. We tackle this problem for an integrated steel plant in Ghent, Belgium, using ...
Ansgar Fehnker
118
Voted
ICICS
2007
Springer
15 years 10 months ago
A Framework for Game-Based Security Proofs
Abstract. To be accepted, a cryptographic scheme must come with a proof that it satisfies some standard security properties. However, because cryptographic schemes are based on no...
David Nowak