A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Action Refinement in Process Algebra and Security Issues
[chapter]
2008
Lecture Notes in Computer Science
We study the relationships between action refinement and security properties within the Security Process Algebra (SPA). ...
Finally, we consider information flow security properties for SPA processes and define a decidable class of secure processes which is closed under refinement. ...
Conclusions and Related Works In this paper we study the relationships between action refinement and information flow security within the Security Process Algebra (SPA). ...
doi:10.1007/978-3-540-78769-3_14
fatcat:avn2iu3e4rdkbggdbf3mvqrvee
Relating multiset rewriting and process algebras for security protocol analysis
2005
Journal of Computer Security
In this paper, we examine the relationship between two general verification frameworks: multiset rewriting (MSR) and a process algebra (PA) inspired to CCS and the π-calculus. ...
When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable. ...
Section 2 recalls the multiset rewriting and process algebra frameworks and in Section 3 their use in the specification of security protocols. ...
doi:10.3233/jcs-2005-13102
fatcat:ssw2vdrcbvd27odcb43jjzmtfy
Process algebra and non-interference
2001
Journal of Computer Security
Casting these security concepts in a process algebraic framework clarifies the relationship between them and allows many results to be carried over regarding, for example, composition and unwinding. ...
The information security community has long debated the exact definition of the term 'security'. ...
Process algebra Process algebras provide a particular approach to the study of concurrency and interaction. ...
doi:10.3233/jcs-2001-91-204
fatcat:wzj5omhd5bc4pnsduxhyx4hq74
A Process Algebraic Approach to Security Policies
[chapter]
2003
IFIP Advances in Information and Communication Technology
We argue that the properties of interest can be expressed cleanly in a mainstream formal method, in particular in the process algebra esp. ...
We discuss the nature of security policies, particularly those that arise in the context of healthcare informatics, and the kind of mathematical framework needed to describe and reason about them. ...
It has benefited from discussions with Latanya Sweeney and John Dobson. ...
doi:10.1007/978-0-387-35697-6_23
fatcat:semp53ussjdqfck7cvwq4434qa
Formalization of Viruses and Malware Through Process Algebras
2010
2010 International Conference on Availability, Reliability and Security
In terms of expressiveness, the process-based model supports the fundamental notion of self-replication but also interactions, concurrency and nontermination to cover evolved malware. ...
In terms of protection, detection undecidability and prevention by isolation still hold. ...
Bonfante and J-Y. Marion for their help and working leads during the exploration of the process algebras. ...
doi:10.1109/ares.2010.59
dblp:conf/IEEEares/JacobFD10
fatcat:qwjpn2i5mnh4zarfw6bfk4nvui
Application of algebra and discrete wavelet transform in two-dimensional data (RGB-images) security
2014
International Journal of Wavelets, Multiresolution and Information Processing
This method will have large potential usage in the digital RGB image processing and the security of image data. ...
Security analysis, and detailed comparison between formerly developed techniques and proposed cryptosystem are also discussed for the robustness of the technique. ...
But cryptanalysts try to break the security of data, and this process is known as hacking. ...
doi:10.1142/s0219691314500404
fatcat:3ugw6fouurhllamxz44fjhyc5y
Modeling and reconfiguration of critical business processes for the purpose of a Business Continuity Management respecting security, risk and compliance requirements at Credit Suisse using algebraic graph transformation
2009
2009 13th Enterprise Distributed Object Computing Conference Workshops
Because such a process has to respect certain laws, regulations and rules even in emergency situations, we sketch how this can be done during the process reconfiguration by looking at security, risk and ...
In contrast to that, algebraic graph theory can be used as a formal method supporting employees when running business processes need to be reconfigured to recover from specific failures. ...
This paper presents contributions in the area of business continuity management (BCM) with respect to security, risk and compliance and in the area of algebraic graph transformation (AGT). ...
doi:10.1109/edocw.2009.5332015
dblp:conf/edoc/BrandtHE09
fatcat:v3nj7lhtgzfyrfhcipxuykyd5i
Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis
2018
In this paper, we examine the relationship between two general verification frameworks: multiset rewriting (MSR) and a process algebra (PA) inspired to CCS and the -calculus. ...
When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable. ...
Section 2 recalls the multiset rewriting and process algebra frameworks and in Section 3 their use in the specification of security protocols. ...
doi:10.1184/r1/6608939.v1
fatcat:hvbuxtmjazcclbshih6u7gmlfa
Relating Process Algebras and Multiset Rewriting for Security Protocol Analysis
2018
In this paper, we examine the non-trivial relationship between two general verification frameworks: multiset rewriting (MSR) and a process algebra (PA) inspired to the CCS and the pi-calculus. ...
When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable. ...
Section 2 recalls the multiset rewriting and process algebra frameworks and in Section 3 their use in security protocols specification. ...
doi:10.1184/r1/6608948
fatcat:7nfphdncsnhkvgj4gtiva42uby
Process algebra and non-interference
Proceedings of the 12th IEEE Computer Security Foundations Workshop
Casting these security concepts in a process algebraic framework clarifies the relationship between them and allows many results to be carried over regarding, for example, composition and unwinding. ...
The information security community has long debated the exact definition of the term 'security'. ...
Process algebra Process algebras provide a particular approach to the study of concurrency and interaction. ...
doi:10.1109/csfw.1999.779775
dblp:conf/csfw/RyanS99
fatcat:23py4bp25nah5an6lddrtynceq
Modeling and Reconfiguration of critical Business Processes for the purpose of a Business Continuity Management respecting Security, Risk and Compliance requirements at Credit Suisse using Algebraic Graph Transformation: Extended Version
2020
Because such a process has to respect certain laws, regulations and rules even in emergency situations, we sketch how this can be done during the process reconfiguration by looking at security, risk and ...
Furthermore, we show how the analysis can be extended to requirements concerning the information ow using the process algebra mCRL2. ...
This paper presents contributions in the area of business continuity management (BCM) with respect to security, risk and compliance and in the area of algebraic graph transformation (AGT). ...
doi:10.14279/depositonce-10247
fatcat:dnxdqshd5fdcflpmuj4alb3ax4
An Algebraic Model of an Adaptive Extension of DiffServ for MANETs
[chapter]
IFIP International Federation for Information Processing
Then we present a formal model of our proposed extension using stochastic process algebras in order to verify the correctness and the efficiency of the proposed extension. ...
In this paper, we propose an extension to DiffServ QoS architecture in order to enhance its performance and its flexibility when used in MANETs and its adaptation to the characteristics of these networks ...
Markovian Process Algebra [14] ). ...
doi:10.1007/0-387-23198-6_17
dblp:conf/ifip6-2/SalemB04
fatcat:ux7i3is5lbfodpheb6v6zhxaie
Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods
2015
Journal of Software
It aims to transform the data exchange process and its security attribute of a program into algebraic systems which are able to be considered as objection functions and constraint conditions, respectively ...
The information security problems caused by the software vulnerabilities have became more and more complex. ...
Framework 1: Assume the algebraic systems corresponding to the data exchange process and its security attribute are M and N as follows, respectively. ...
doi:10.17706//jsw.10.9.1079-1085
fatcat:6sl5ix335vevvb542svebxo5a4
Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods
2015
Journal of Software
It aims to transform the data exchange process and its security attribute of a program into algebraic systems which are able to be considered as objection functions and constraint conditions, respectively ...
The information security problems caused by the software vulnerabilities have became more and more complex. ...
Framework 1: Assume the algebraic systems corresponding to the data exchange process and its security attribute are M and N as follows, respectively. ...
doi:10.17706/jsw.10.9.1079-1085
fatcat:4cbpxne2dvgipgdwikgs3yrcb4
Algebraic State Machines: Concepts and Applications to Security
[chapter]
2004
Lecture Notes in Computer Science
Each state is an algebra.
Asynchronous communication through
channels.
Here: formal semantics of AlgSMs as
stream-processing functions, composition,
refinement, applications to security. ...
Theorem: Composition and interpretation as stream-processing fn's are preserved by refinement. Similarly: timeless refinement (abstract from time steps before applying refinement). ...
doi:10.1007/978-3-540-39866-0_33
fatcat:x5rk4ftgcze35i4qzxlj4y2vae
« Previous
Showing results 1 — 15 out of 72,880 results