PhD ThesisTrade-off between security and performance has become an intriguing area in recent years in both the security and performance communities. As the security aspects of security protocol research is fully- edged, this thesis is therefore devoted to conducting a performance study of these protocols. The long term objective is to translate formal de nitions of security protocols to formal performance models automatically, then analysing by relevant techniques. In this thesis, we take a preliminary step by studying five typical security protocols, and exploring the methodology of construction and analysis of their models by using the Markovian process algebra PEPA. Through these case studies, an initial framework of performance anal...
Modelling and analysing distributed and mobile software sys-tems is a challenging task. PEPA nets—co...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
Achieving the appropriate performance requirements for computer-communication systems is as importan...
In this paper we consider the use of a fluid flow approximation based on ordinary differential equat...
We present an application of partial evaluation to performance models expressed in the PEPA stochast...
We use a special operational semantics which helps us in predicting quantitative measures on systems...
AbstractWe use a special operational semantics which drives us in inferring quantitative measures on...
AbstractA major development in qualitative model checking was the jump to verifying properties of so...
AbstractWe use a special operational semantics which helps us in predicting quantitative measures on...
The development of cryptographic protocols goes through two stages, namely, security verification an...
International audienceSecurity protocols are distributed programs that aim at securing communication...
Formal analysis has a long and successful track record in the automated verification of security pro...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
Formal models for security protocols often rely on assumptions not to be found in computational mode...
The article discusses the issues of modeling and the analysis of executions, which is a substantial ...
Modelling and analysing distributed and mobile software sys-tems is a challenging task. PEPA nets—co...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
Achieving the appropriate performance requirements for computer-communication systems is as importan...
In this paper we consider the use of a fluid flow approximation based on ordinary differential equat...
We present an application of partial evaluation to performance models expressed in the PEPA stochast...
We use a special operational semantics which helps us in predicting quantitative measures on systems...
AbstractWe use a special operational semantics which drives us in inferring quantitative measures on...
AbstractA major development in qualitative model checking was the jump to verifying properties of so...
AbstractWe use a special operational semantics which helps us in predicting quantitative measures on...
The development of cryptographic protocols goes through two stages, namely, security verification an...
International audienceSecurity protocols are distributed programs that aim at securing communication...
Formal analysis has a long and successful track record in the automated verification of security pro...
International audienceSecurity protocols are the small distributed programs which are omnipresent in...
Formal models for security protocols often rely on assumptions not to be found in computational mode...
The article discusses the issues of modeling and the analysis of executions, which is a substantial ...
Modelling and analysing distributed and mobile software sys-tems is a challenging task. PEPA nets—co...
AbstractThis paper contributes to further closing the gap between formal analysis and concrete imple...
Achieving the appropriate performance requirements for computer-communication systems is as importan...