Now showing items 1-6 of 6
The 1st workshop on model-based verification & validation: Directed acyclic graph modeling of security policies for firewall testing
Currently network security of institutions highly depend on firewalls, which are used to separate untrusted network from trusted one by enforcing security policies. Security policies used in firewalls are ordered set of ...
Modeling efficient multi-chained stream signature protocol using communicating sequential processeses
Communicating Sequential Processes (CSP) is a process algebra, designed for modeling and analyzing the behavior of concurrent systems. Several security protocols are modeled with CSP and verified using model-checking or ...
Challenges for the security analysis of next generation networks
(Elsevier BV., 2011-02)
The increasing complexity of information and telecommunications systems and networks is reaching a level beyond human ability, mainly from the security assessment viewpoint. Methodologies currently proposed for managing ...
Mutation-based evaluation of weighted test case selection for firewall testing
As part of network security testing an administrator needs to know whether the firewall enforces the security policy as expected or not. In this setting black-box testing and evaluation methodologies can be helpful. In ...
Utilization of timed automata as a verification tool for security protocols
Timed Automata is an extension to the automata-theoretic approach for the modeling of real time systems that introduces time into the classical automata. It has become an important research area in both the context of ...
Comparison of group key establishment protocols
Recently group-oriented applications over unsecure open networks such as Internet or wireless networks have become very popular. Thus, group communication security over unsecure open networks has become a vital concern. ...