Sciweavers

64 search results - page 5 / 13
» Specifying and analyzing security automata using CSP-OZ
Sort
View
CCS
2001
ACM
15 years 6 months ago
Formalizing GDOI group key management requirements in NPATRL
Although there is a substantial amount of work on formal requirements for two and three-party key distribution protocols, very little has been done on requirements for group proto...
Catherine Meadows, Paul F. Syverson
HPCNCS
2007
15 years 3 months ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...
171
Voted
AGTIVE
2007
Springer
15 years 5 months ago
Transforming Timeline Specifications into Automata for Runtime Monitoring
Abstract. In runtime monitoring, a programmer specifies code to execute whenever a sequence of events occurs during program execution. Previous and related work has shown that runt...
Eric Bodden, Hans Vangheluwe
137
Voted
ANCS
2007
ACM
15 years 5 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
FASE
2004
Springer
15 years 5 months ago
Specification and Analysis of Real-Time Systems Using Real-Time Maude
Real-Time Maude is a language and tool supporting the formal specification and analysis of real-time and hybrid systems. The specification formalism is based on rewriting logic, em...
Peter Csaba Ölveczky, José Meseguer