Sciweavers

53 search results - page 1 / 11
» Modeling and Analysis of Security Protocols Using Role Based...
Sort
View
114
Voted
APN
2008
Springer
15 years 26 days ago
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
Abstract. In this paper, we introduce a framework composed of a syntax and its compositional Petri net semantics, for the specification and verification of properties (like authent...
Roland Bouroulet, Raymond R. Devillers, Hanna Klau...
103
Voted
ISSE
2010
14 years 5 months ago
Coloured Petri net refinement specification and correctness proof with Coq
In this work, we address the formalisation of symmetric nets, a subclass of coloured Petri nets, refinement in COQ. We first provide a formalisation of the net models, and of thei...
Christine Choppy, Micaela Mayero, Laure Petrucci
EMS
2008
IEEE
15 years 18 days ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
79
Voted
WSC
2007
15 years 1 months ago
Representation and simulation of stochastic petrinet models using xPNML
The paper presents an extensible Petri Net Markup Language (xPNML), which is an extended version of PNML. The xPNML format overcomes limitations associated with PNML structure for...
Hyunsoo Lee, Bikram Sharda, Amarnath Banerjee
CNSR
2006
IEEE
136views Communications» more  CNSR 2006»
15 years 4 months ago
Combining Petri Nets and ns-2: A Hybrid Method for Analysis and Simulation
Network protocol performance and evaluation study is often carried out using a couple of widely used simulation toolkits, such as ns-2 and OPNET. These toolkits usually contain ma...
Qiang Ye, Mike H. MacGregor