Timed automata as a formalism for expressing security: A survey on theory and practice

J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …

SDTIOA: modeling the timed privacy requirements of IoT service composition: a user interaction perspective for automatic transformation from BPEL to timed automata

H Gao, Y Zhang, H Miao, RJD Barroso… - Mobile Networks and …, 2021 - Springer
With the development of the Internet of Things (IoT) and the Internet, new kinds of services
based on IoT devices will benefit everyone. As a key step in achieving a complex business …

Cache privacy in named-data networking

G Acs, M Conti, P Gasti, C Ghali… - 2013 IEEE 33rd …, 2013 - ieeexplore.ieee.org
Content-Centric Networking (CCN) is an alternative to host-centric networking exemplified
by today's Internet. CCN emphasizes content distribution by making content directly …

Privacy-aware caching in information-centric networking

G Acs, M Conti, P Gasti, C Ghali… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Information-Centric Networking (ICN) is an emerging networking paradigm where named
and routable data (content) is the focal point. Users send explicit requests (interests) which …

Timed model checking of security protocols

R Corin, S Etalle, PH Hartel, A Mader - … of the 2004 ACM workshop on …, 2004 - dl.acm.org
We propose a method for engineering security protocols that are aware of timing aspects.
We study a simplified version of the well-known Needham Schroeder protocol and the …

A defense mechanism against timing attacks on user privacy in ICN

V Sivaraman, B Sikdar - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
While in-network caching is an essential feature of Information Centric Networks (ICN) for
improved content dissemination and reducing the bandwidth consumption at the core of the …

Timed analysis of security protocols

R Corin, S Etalle, PH Hartel… - Journal of Computer …, 2007 - content.iospress.com
We propose a method for engineering security protocols that are aware of timing aspects.
We study a simplified version of the well-known Needham Schroeder protocol and the …

Protecting router cache privacy in named data networking

M Gao, X Zhu, Y Su - 2015 IEEE/CIC International Conference …, 2015 - ieeexplore.ieee.org
With users' explosively increasing needs for online data, current IP-based or host-based
Internet architecture is becoming insufficient and outdated gradually. Named Data …

Time and probability-based information flow analysis

R Lanotte, A Maggiolo-Schettini… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In multilevel systems, it is important to avoid unwanted indirect information flow from higher
levels to lower levels, namely, the so-called covert channels. Initial studies of information …

Analysis models for security protocols

RJ Corin - 2006 - research.utwente.nl
In this thesis, we present five significant, orthogonal extensions to the Dolev Yao model.
Each extension considers a more realistic setting, closer to the real world, thus providing a …