Sciweavers

53 search results - page 8 / 11
» Modeling and Analysis of Security Protocols Using Role Based...
Sort
View
CSFW
1999
IEEE
13 years 10 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
ACSAC
2006
IEEE
13 years 10 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark
ITRUST
2004
Springer
13 years 11 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
TDSC
2008
152views more  TDSC 2008»
13 years 6 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
SQJ
2008
94views more  SQJ 2008»
13 years 6 months ago
Simulation-based analysis of UML statechart diagrams: methods and case studies
- We present a comprehensive UML statechart diagram analysis framework. This framework allows one to progressively perform different analysis operations to analyze UML statechart d...
Jiexin Lian, Zhaoxia Hu, Sol M. Shatz