We consider two different approaches to security issues. In the first one bisimulation equivalences (dynamic verifications) are exploited to verify non-interference security properties on a CCS-like process algebra calculus. In the second approach control flow analysis (static analysis) is applied to verify security properties in Mobile Ambient calculus. We analyze how a simple electronic commerce case study can be modeled and its integrity verified using the two techniques. The tools CoPS and BANANA are used to perform the computations
We present a Control Flow Analysis (CFA) for the Safe Ambients, a variant of the calculus of Mobile ...
In this paper we show how the partial model checking approach for the analysis of secure systems may...
iii In cyber-physical systems, which are the integrations of computational and physical processes, s...
We consider two different approaches to security issues. In the first one bisimulation equivalences ...
We consider two different approaches to security issues. In the first one bisimulation equivalences ...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
We model, in a process algebra framework, a variant of the well known Wide Mouthed Frog security pro...
AbstractWe model, in a process algebra framework, a variant of the well known Wide Mouthed Frog secu...
Given the complementary nature of static and dynamic analysis, there has been much work on identifyi...
Model checking is an evolving technology for effective and efficient evaluation of e-business protoc...
E-commerce systems have become tremendously popular and important for modern business processes in t...
An e-business ’ economic well-being is dependent on the correctness of its e-processes. This relianc...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigu...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
We present a Control Flow Analysis (CFA) for the Safe Ambients, a variant of the calculus of Mobile ...
In this paper we show how the partial model checking approach for the analysis of secure systems may...
iii In cyber-physical systems, which are the integrations of computational and physical processes, s...
We consider two different approaches to security issues. In the first one bisimulation equivalences ...
We consider two different approaches to security issues. In the first one bisimulation equivalences ...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
We model, in a process algebra framework, a variant of the well known Wide Mouthed Frog security pro...
AbstractWe model, in a process algebra framework, a variant of the well known Wide Mouthed Frog secu...
Given the complementary nature of static and dynamic analysis, there has been much work on identifyi...
Model checking is an evolving technology for effective and efficient evaluation of e-business protoc...
E-commerce systems have become tremendously popular and important for modern business processes in t...
An e-business ’ economic well-being is dependent on the correctness of its e-processes. This relianc...
Web services providing E-commerce capabilities to support business transactions over the Internet ar...
We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigu...
We present a formal model for security protocols of smart card applications using Abstract State Mac...
We present a Control Flow Analysis (CFA) for the Safe Ambients, a variant of the calculus of Mobile ...
In this paper we show how the partial model checking approach for the analysis of secure systems may...
iii In cyber-physical systems, which are the integrations of computational and physical processes, s...