Sciweavers

1123 search results - page 14 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
FROCOS
2007
Springer
15 years 5 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
RSP
2007
IEEE
139views Control Systems» more  RSP 2007»
15 years 6 months ago
Verifying Distributed Protocols using MSC-Assertions, Run-time Monitoring, and Automatic Test Generation
This paper addresses the need for formal specification and runtime verification of system-level requirements of distributed reactive systems. It describes a formalism for specifyi...
Doron Drusinsky, Man-tak Shing
COMCOM
2008
80views more  COMCOM 2008»
14 years 11 months ago
Transforming general networks into feed-forward by using turn-prohibition
The issue of breaking cycles in communication networks is an important topic for several reasons. For instance, it is required when transparent bridges are filling the forwarding ...
Juan Echagüe, Jesús E. Villadangos, Vi...
102
Voted
COMCOM
2006
121views more  COMCOM 2006»
14 years 11 months ago
Interactive Transparent Networking: Protocol meta modeling based on EFSM
the extensibility and evolution of network services and protocols had become a major research issue in recent years. The 'programmable' and 'active' network par...
Javed I. Khan, Raid Zaghal
ISEMANTICS
2010
14 years 10 months ago
Towards an approach for formalizing the supply chain operations
Reference models play an important role in the knowledge management of the various complex collaboration domains (such as Supply Chain Networks). However, they often show a lack o...
Milan Zdravkovic, Hervé Panetto, Miroslav T...