Timed automata as a formalism for expressing security: A survey on theory and practice
J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …
timing constraints. They extend finite-state automata with clocks, that constrain the system …
SDTIOA: modeling the timed privacy requirements of IoT service composition: a user interaction perspective for automatic transformation from BPEL to timed automata
With the development of the Internet of Things (IoT) and the Internet, new kinds of services
based on IoT devices will benefit everyone. As a key step in achieving a complex business …
based on IoT devices will benefit everyone. As a key step in achieving a complex business …
Cache privacy in named-data networking
Content-Centric Networking (CCN) is an alternative to host-centric networking exemplified
by today's Internet. CCN emphasizes content distribution by making content directly …
by today's Internet. CCN emphasizes content distribution by making content directly …
Privacy-aware caching in information-centric networking
Information-Centric Networking (ICN) is an emerging networking paradigm where named
and routable data (content) is the focal point. Users send explicit requests (interests) which …
and routable data (content) is the focal point. Users send explicit requests (interests) which …
Timed model checking of security protocols
We propose a method for engineering security protocols that are aware of timing aspects.
We study a simplified version of the well-known Needham Schroeder protocol and the …
We study a simplified version of the well-known Needham Schroeder protocol and the …
A defense mechanism against timing attacks on user privacy in ICN
While in-network caching is an essential feature of Information Centric Networks (ICN) for
improved content dissemination and reducing the bandwidth consumption at the core of the …
improved content dissemination and reducing the bandwidth consumption at the core of the …
Timed analysis of security protocols
We propose a method for engineering security protocols that are aware of timing aspects.
We study a simplified version of the well-known Needham Schroeder protocol and the …
We study a simplified version of the well-known Needham Schroeder protocol and the …
Protecting router cache privacy in named data networking
M Gao, X Zhu, Y Su - 2015 IEEE/CIC International Conference …, 2015 - ieeexplore.ieee.org
With users' explosively increasing needs for online data, current IP-based or host-based
Internet architecture is becoming insufficient and outdated gradually. Named Data …
Internet architecture is becoming insufficient and outdated gradually. Named Data …
Time and probability-based information flow analysis
R Lanotte, A Maggiolo-Schettini… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In multilevel systems, it is important to avoid unwanted indirect information flow from higher
levels to lower levels, namely, the so-called covert channels. Initial studies of information …
levels to lower levels, namely, the so-called covert channels. Initial studies of information …
Analysis models for security protocols
RJ Corin - 2006 - research.utwente.nl
In this thesis, we present five significant, orthogonal extensions to the Dolev Yao model.
Each extension considers a more realistic setting, closer to the real world, thus providing a …
Each extension considers a more realistic setting, closer to the real world, thus providing a …