A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure synthesis and activation of protocol translation agents
1997
Distributed Systems Engineering
We provide rationale for the translation mechanism and the synthesis environment, with specific emphasis on the security issues arising in Nestor. ...
We focus on the design of Nestor, an environment for synthesizing and managing RPC protocol translation agents. ...
Acknowledgments This work was partly supported by NASA and its Socioeconomic Data and Applications Center operated by the Consortium for International Earth Sciences Information Networking. ...
doi:10.1088/0967-1846/4/4/002
fatcat:k5lkoqgoszd3jblthvbuzregdm
Federated autonomic Network Access Control
2011
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG)
We are building a distributed security management framework whereby a network of agents can monitor threats and use these catalogues of best practice to automatically generate compliant NAC configurations ...
Synthesis of NAC configurations uses a set of pre-defined catalogues of NAC best practice countermeasures, rather than over the space of all possible NAC configurations. ...
doi:10.1109/safeconfig.2011.6111668
dblp:conf/safeconfig/FoleyFA11
fatcat:ljzyaalb55cf5gnov4uypomrti
Automatic Generation of Certifiable Space Communication Software
2007
2007 IEEE Aerospace Conference
Automatic, tamper-proof formal certification techniques are used to provide explicit guarantees about important reliability and security properties and the absence of implementation errors. ...
Smooth control of spacecraft and the downlink of mission and science data rely heavily on reliable means of communication. ...
Although secure communication protocols are in wide use, history has shown that many errors and vulnerabilities do exist and have been actively exploited. ...
doi:10.1109/aero.2007.352903
fatcat:2u2p5l6zyfeb5hpmtqwtyxfvde
Formal Verification of Payment protocol using AVISPA
2010
International Journal for Infonomics
Emerging e-commerce activity is giving scope for the design of many new protocols, and to gain confidence, these protocol need to be verified for its designed properties. ...
AVISPA is one of the evolving tools used mainly for verifying security properties. A newly designed electronic payment protocol is verified for its correctness and security properties. ...
MMA is an authorized agent of MA. ...
doi:10.20533/iji.1742.4712.2010.0035
fatcat:72g7exi4c5ejriugnapb5vb6ky
Timed automata as a formalism for expressing security: A survey on theory and practice
2022
ACM Computing Surveys
While timed automata were originally designed for safety (in the wide sense of correctness w.r.t. a formal property), they were progressively used in a number of works to guarantee security properties. ...
In this work, we review works studying security properties for timed automata in the last two decades. ...
We would like to thank anonymous reviewers for their useful comments, as well as Jaime Arias and Laure Petrucci for a feedback on their recent works. ...
doi:10.1145/3534967
fatcat:bq3focapvzh77lf5qvdx4oskcm
Designing an agent synthesis system for cross-RPC communication
1994
IEEE Transactions on Software Engineering
Because of its synthesis capability, our system also facilitates the design and implementation of new RPC protocols through rapid prototyping. ...
We have built a prototype system to validate the design and to estimate the agent development costs and cross-RPC performance. ...
and activate RPC agents automatically. ...
doi:10.1109/32.268920
fatcat:4gvxmpxwfzdm3excixf5q6y3ye
Towards Verifying Voter Privacy through Unlinkability
[chapter]
2013
Lecture Notes in Computer Science
New message operators for association extraction and synthesis are defined. ...
Proving voter privacy demanded substantial effort and provided novel insights into both electronic voting protocols themselves and the analysed security goals. ...
that an active attacker can derive from intercepting the protocol traffic. ...
doi:10.1007/978-3-642-36563-8_7
fatcat:36yjp4oqcbdqloum3k5yad7rxu
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
2005
Logic Journal of the IGPL
Both translations preserve the essential ingredients of protocol execution and thereby also security properties like secrecy and authentication. ...
We define translations between models in our logic and strand-space models of security protocols, and we compare the results obtained with respect to the level of abstraction that is inherent in each of ...
in most other approaches to security protocol analysis, such as ours based on DTPL, it is customary to follow Dolev and Yao [17] and consider the model of an active intruder who controls the network ...
doi:10.1093/jigpal/jzi048
fatcat:2phq2y5ssrgtjh4yy2r7q43gv4
Programming and simulation of quantum search agents
2007
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems - AAMAS '07
The extension of classical agents by the ability to perform quantum computation and communication provides an efficient and secure solution to applications such as information search and service matchmaking ...
In this paper, we propose a hybrid architecture for quantum computational agents, and demonstrate its principles by means of a simple type-I quantum search agent based on quantum pattern matching. ...
Communication between type-I QC agents has to be additionally secured which is not necessary in case of inherently secure type-II QC agents. ...
doi:10.1145/1329125.1329230
dblp:conf/atal/KluschS07
fatcat:dmkpt4td5jajpkjrfifudot53a
Programming and simulation of quantum search agents
2007
2007 IEEE International Conference on Systems, Man and Cybernetics
The extension of classical agents by the ability to perform quantum computation and communication provides an efficient and secure solution to applications such as information search and service matchmaking ...
In this paper, we propose a hybrid architecture for quantum computational agents, and demonstrate its principles by means of a simple type-I quantum search agent based on quantum pattern matching. ...
Communication between type-I QC agents has to be additionally secured which is not necessary in case of inherently secure type-II QC agents. ...
doi:10.1109/icsmc.2007.4413701
dblp:conf/smc/KluschS07
fatcat:kvvgenurizb6fee6old5pvbvpm
Developing security protocols by refinement
2010
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10
The abstractions used provide insights on how the protocols work and foster the development of families of protocols sharing a common structure and properties. ...
Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style intruder. ...
Acknowledgements We thank Jean-Raymond Abrial, Son Thai Hoang, and Egon Börger for fruitful discussions. ...
doi:10.1145/1866307.1866349
dblp:conf/ccs/SprengerB10
fatcat:l6jf53umcvfbvedga7fi5bu4fq
Automatic Composition of Services with Security Policies
2008
2008 IEEE Congress on Services - Part I
For the domain of security services (such as digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. ...
The resulting composed service can be verified automatically for ensuring that it cannot be subject to active attacks from intruders. ...
The key idea was to interpret available services as protocol roles, an orchestration activity as an intruder (in security protocol analysis) and executable services compositions as attacks scenarios. ...
doi:10.1109/services-1.2008.13
dblp:conf/services/ChevalierMR08
fatcat:v2w6on7grvb33gwxqwzacikqfq
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
1999
Computer Communications
Recent research work focuses on the ex-ante use of formal methods in the design state of new security protocols, as the synthesis approach. ...
Formal methods, theory, and supporting tools can aid the design, analysis, and verification of the security-related and cryptographic protocols used over open networks and distributed systems. ...
Paulson, University of Cambridge, C. Boyd, Queensland University of Technology, W. Mao, Hewlett-Packard, and the anonymous referees for their insightful remarks and constructive comments. ...
doi:10.1016/s0140-3664(99)00030-4
fatcat:cv3vmaztf5drxc2edllnfgefva
Remote Control Research in Central Africa
2006
Civilisations
detailed research protocol, (v) implementation and (vi) analysis of findings and presentation of results. ...
control research ' step-by-step: (i) conceptualisation, (ii) identification and recruitment of local experts, (iii) selection of research sites, (iv) the process of formulating a locally appropriate and ...
-Police, Customs and Security agents are omnipresent and efficient in controlling the movement of people and goods. How do local stakeholders perceive them? ...
doi:10.4000/civilisations.405
fatcat:mmte2n5rprh7tiawclgnwnremm
Insulin Stimulation of Protein Synthesis in Rat Skeletal Muscle Following Resistance Exercise Is Maintained With Advancing Age
1996
The journals of gerontology. Series A, Biological sciences and medical sciences
occurred at the level of translation. ...
These data suggest that following resistance exercise, insulin increased rates of protein synthesis in both soleus and GAST regardless of age, and it appeared that this insulinmediated elevation may have ...
DK-13499 and DK-15658 from the NIDDK (LSJ), and AG-10627 (PAF). ...
doi:10.1093/gerona/51a.5.b323
pmid:8808980
fatcat:xfxapr25kfgsriwbdhzywepera
« Previous
Showing results 1 — 15 out of 20,709 results