E-commerce transactions rely on end-to-end protocols to provide security guarantees when messages are sent through intermediaries. If autonomous entities with different security requirements are to collaborate, protocols providing end-to-end security must be synthesized at runtime. However, such an approach is predicated on finding security primitives and ways of expressing interdependencies between semantics and security. The proposed approach defines fine-grained security properties by combining basic properties and enforcing them in a predefined order. The use of standard security properties allows autonomous entities to reason about security requirements. Furthermore, the novel propagation rules defined allow end-to-end security propert...
The aim of this research is to present a new methodology for the systematic de sign of compound prot...
Abstract. Security protocols are notoriously difficult to debug. One ap-proach to the automatic veri...
International audienceNumerous communication protocols have been designed offering a set of security...
Communication protocols are the computational basis for distributed electronic commerce systems, and...
AbstractIn this paper we extend the results proposed in [5] so as to provide an approach for finding...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
AbstractThis paper continues the program initiated in [5], towards a derivation system for security ...
There are a large amount of programs in the development process in todays technology environment, an...
Abstract — Given its special nature, e-commerce yields concerns for providing secure transactions. A...
Security protocols (cryptographic protocol) have been widely used to not only achieve traditional go...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
AbstractThe primary objective of this paper is to present the definition of a new dynamic, linear an...
Business-to-consumer electronic commerce (e-commerce), one form of which is Web-based shopping, is d...
A number of researchers have proposed various tools for checking security protocols. Most of these t...
Security system architecture governs the composition of components in security systems and interacti...
The aim of this research is to present a new methodology for the systematic de sign of compound prot...
Abstract. Security protocols are notoriously difficult to debug. One ap-proach to the automatic veri...
International audienceNumerous communication protocols have been designed offering a set of security...
Communication protocols are the computational basis for distributed electronic commerce systems, and...
AbstractIn this paper we extend the results proposed in [5] so as to provide an approach for finding...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
AbstractThis paper continues the program initiated in [5], towards a derivation system for security ...
There are a large amount of programs in the development process in todays technology environment, an...
Abstract — Given its special nature, e-commerce yields concerns for providing secure transactions. A...
Security protocols (cryptographic protocol) have been widely used to not only achieve traditional go...
We explore the applicability of the programming method of Feijen and van Gasteren to the domain of s...
AbstractThe primary objective of this paper is to present the definition of a new dynamic, linear an...
Business-to-consumer electronic commerce (e-commerce), one form of which is Web-based shopping, is d...
A number of researchers have proposed various tools for checking security protocols. Most of these t...
Security system architecture governs the composition of components in security systems and interacti...
The aim of this research is to present a new methodology for the systematic de sign of compound prot...
Abstract. Security protocols are notoriously difficult to debug. One ap-proach to the automatic veri...
International audienceNumerous communication protocols have been designed offering a set of security...