Filters








20,709 Hits in 2.0 sec

Secure synthesis and activation of protocol translation agents

Yen-Min Huang, Chinya V Ravishankar
1997 Distributed Systems Engineering  
We provide rationale for the translation mechanism and the synthesis environment, with specific emphasis on the security issues arising in Nestor.  ...  We focus on the design of Nestor, an environment for synthesizing and managing RPC protocol translation agents.  ...  Acknowledgments This work was partly supported by NASA and its Socioeconomic Data and Applications Center operated by the Consortium for International Earth Sciences Information Networking.  ... 
doi:10.1088/0967-1846/4/4/002 fatcat:k5lkoqgoszd3jblthvbuzregdm

Federated autonomic Network Access Control

Simon N. Foley, William M. Fitzgerald, Wayne Mac Adams
2011 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG)  
We are building a distributed security management framework whereby a network of agents can monitor threats and use these catalogues of best practice to automatically generate compliant NAC configurations  ...  Synthesis of NAC configurations uses a set of pre-defined catalogues of NAC best practice countermeasures, rather than over the space of all possible NAC configurations.  ... 
doi:10.1109/safeconfig.2011.6111668 dblp:conf/safeconfig/FoleyFA11 fatcat:ljzyaalb55cf5gnov4uypomrti

Automatic Generation of Certifiable Space Communication Software

Johann Schumann, Ewen Denney
2007 2007 IEEE Aerospace Conference  
Automatic, tamper-proof formal certification techniques are used to provide explicit guarantees about important reliability and security properties and the absence of implementation errors.  ...  Smooth control of spacecraft and the downlink of mission and science data rely heavily on reliable means of communication.  ...  Although secure communication protocols are in wide use, history has shown that many errors and vulnerabilities do exist and have been actively exploited.  ... 
doi:10.1109/aero.2007.352903 fatcat:2u2p5l6zyfeb5hpmtqwtyxfvde

Formal Verification of Payment protocol using AVISPA

A.R. Rizwana Shaikh, Satish Devane
2010 International Journal for Infonomics  
Emerging e-commerce activity is giving scope for the design of many new protocols, and to gain confidence, these protocol need to be verified for its designed properties.  ...  AVISPA is one of the evolving tools used mainly for verifying security properties. A newly designed electronic payment protocol is verified for its correctness and security properties.  ...  MMA is an authorized agent of MA.  ... 
doi:10.20533/iji.1742.4712.2010.0035 fatcat:72g7exi4c5ejriugnapb5vb6ky

Timed automata as a formalism for expressing security: A survey on theory and practice

Johan Arcile, Étienne André
2022 ACM Computing Surveys  
While timed automata were originally designed for safety (in the wide sense of correctness w.r.t. a formal property), they were progressively used in a number of works to guarantee security properties.  ...  In this work, we review works studying security properties for timed automata in the last two decades.  ...  We would like to thank anonymous reviewers for their useful comments, as well as Jaime Arias and Laure Petrucci for a feedback on their recent works.  ... 
doi:10.1145/3534967 fatcat:bq3focapvzh77lf5qvdx4oskcm

Designing an agent synthesis system for cross-RPC communication

Yen-Min Huang, C.V. Ravishankar
1994 IEEE Transactions on Software Engineering  
Because of its synthesis capability, our system also facilitates the design and implementation of new RPC protocols through rapid prototyping.  ...  We have built a prototype system to validate the design and to estimate the agent development costs and cross-RPC performance.  ...  and activate RPC agents automatically.  ... 
doi:10.1109/32.268920 fatcat:4gvxmpxwfzdm3excixf5q6y3ye

Towards Verifying Voter Privacy through Unlinkability [chapter]

Denis Butin, David Gray, Giampaolo Bella
2013 Lecture Notes in Computer Science  
New message operators for association extraction and synthesis are defined.  ...  Proving voter privacy demanded substantial effort and provided novel insights into both electronic voting protocols themselves and the analysed security goals.  ...  that an active attacker can derive from intercepting the protocol traffic.  ... 
doi:10.1007/978-3-642-36563-8_7 fatcat:36yjp4oqcbdqloum3k5yad7rxu

Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis

Carlos Caleiro, Luca Viganò, David Basin
2005 Logic Journal of the IGPL  
Both translations preserve the essential ingredients of protocol execution and thereby also security properties like secrecy and authentication.  ...  We define translations between models in our logic and strand-space models of security protocols, and we compare the results obtained with respect to the level of abstraction that is inherent in each of  ...  in most other approaches to security protocol analysis, such as ours based on DTPL, it is customary to follow Dolev and Yao [17] and consider the model of an active intruder who controls the network  ... 
doi:10.1093/jigpal/jzi048 fatcat:2phq2y5ssrgtjh4yy2r7q43gv4

Programming and simulation of quantum search agents

Matthias Klusch, René Schubotz
2007 Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems - AAMAS '07  
The extension of classical agents by the ability to perform quantum computation and communication provides an efficient and secure solution to applications such as information search and service matchmaking  ...  In this paper, we propose a hybrid architecture for quantum computational agents, and demonstrate its principles by means of a simple type-I quantum search agent based on quantum pattern matching.  ...  Communication between type-I QC agents has to be additionally secured which is not necessary in case of inherently secure type-II QC agents.  ... 
doi:10.1145/1329125.1329230 dblp:conf/atal/KluschS07 fatcat:dmkpt4td5jajpkjrfifudot53a

Programming and simulation of quantum search agents

Matthias Klusch, Rene Schubotz
2007 2007 IEEE International Conference on Systems, Man and Cybernetics  
The extension of classical agents by the ability to perform quantum computation and communication provides an efficient and secure solution to applications such as information search and service matchmaking  ...  In this paper, we propose a hybrid architecture for quantum computational agents, and demonstrate its principles by means of a simple type-I quantum search agent based on quantum pattern matching.  ...  Communication between type-I QC agents has to be additionally secured which is not necessary in case of inherently secure type-II QC agents.  ... 
doi:10.1109/icsmc.2007.4413701 dblp:conf/smc/KluschS07 fatcat:kvvgenurizb6fee6old5pvbvpm

Developing security protocols by refinement

Christoph Sprenger, David Basin
2010 Proceedings of the 17th ACM conference on Computer and communications security - CCS '10  
The abstractions used provide insights on how the protocols work and foster the development of families of protocols sharing a common structure and properties.  ...  Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder.  ...  Acknowledgements We thank Jean-Raymond Abrial, Son Thai Hoang, and Egon Börger for fruitful discussions.  ... 
doi:10.1145/1866307.1866349 dblp:conf/ccs/SprengerB10 fatcat:l6jf53umcvfbvedga7fi5bu4fq

Automatic Composition of Services with Security Policies

Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
2008 2008 IEEE Congress on Services - Part I  
For the domain of security services (such as digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies.  ...  The resulting composed service can be verified automatically for ensuring that it cannot be subject to active attacks from intruders.  ...  The key idea was to interpret available services as protocol roles, an orchestration activity as an intruder (in security protocol analysis) and executable services compositions as attacks scenarios.  ... 
doi:10.1109/services-1.2008.13 dblp:conf/services/ChevalierMR08 fatcat:v2w6on7grvb33gwxqwzacikqfq

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification

S Gritzalis, D Spinellis, P Georgiadis
1999 Computer Communications  
Recent research work focuses on the ex-ante use of formal methods in the design state of new security protocols, as the synthesis approach.  ...  Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems.  ...  Paulson, University of Cambridge, C. Boyd, Queensland University of Technology, W. Mao, Hewlett-Packard, and the anonymous referees for their insightful remarks and constructive comments.  ... 
doi:10.1016/s0140-3664(99)00030-4 fatcat:cv3vmaztf5drxc2edllnfgefva

Remote Control Research in Central Africa

Theodore Trefon, Serge Cogels
2006 Civilisations  
detailed research protocol, (v) implementation and (vi) analysis of findings and presentation of results.  ...  control research ' step-by-step: (i) conceptualisation, (ii) identification and recruitment of local experts, (iii) selection of research sites, (iv) the process of formulating a locally appropriate and  ...  -Police, Customs and Security agents are omnipresent and efficient in controlling the movement of people and goods. How do local stakeholders perceive them?  ... 
doi:10.4000/civilisations.405 fatcat:mmte2n5rprh7tiawclgnwnremm

Insulin Stimulation of Protein Synthesis in Rat Skeletal Muscle Following Resistance Exercise Is Maintained With Advancing Age

J. D. Fluckey, T. C. Vary, L. S. Jefferson, W. J. Evans, P. A. Farrell
1996 The journals of gerontology. Series A, Biological sciences and medical sciences  
occurred at the level of translation.  ...  These data suggest that following resistance exercise, insulin increased rates of protein synthesis in both soleus and GAST regardless of age, and it appeared that this insulinmediated elevation may have  ...  DK-13499 and DK-15658 from the NIDDK (LSJ), and AG-10627 (PAF).  ... 
doi:10.1093/gerona/51a.5.b323 pmid:8808980 fatcat:xfxapr25kfgsriwbdhzywepera
« Previous Showing results 1 — 15 out of 20,709 results