Sciweavers

286 search results - page 30 / 58
» Pitfalls in Formal Reasoning about Security Protocols
Sort
View
124
Voted
CL
2007
Springer
14 years 11 months ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
15 years 5 months ago
Electronic Voting Systems: Security Implications of the Administrative Workflow
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focu...
Costas Lambrinoudakis, Spyros Kokolakis, Maria Kar...
JCS
2010
112views more  JCS 2010»
14 years 10 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
ESWS
2008
Springer
15 years 25 days ago
Semantic Web Technology for Agent Communication Protocols
One relevant aspect in the development of the Semantic Web framework is the achievement of a real inter-agents communication capability at the semantic level. The agents should be ...
Idoia Berges, Jesús Bermúdez, Alfred...
SP
1997
IEEE
112views Security Privacy» more  SP 1997»
15 years 4 months ago
Analyzing Consistency of Security Policies
This paper discusses the development of a methodology for reasoning about properties of security policies. We view a security policy as a special case of regulation which specifi...
Laurence Cholvy, Frédéric Cuppens