-
3
-
-
84936881073
-
-
J. Koehler, G. Tirenni, S. Kumaran, From business process model to consistent implementation: a case for formal verification methods, in: Proceedings of EDOC 2002, 2002.
-
-
-
-
4
-
-
33646425952
-
-
A. Ankolekar, M. Paolucci, K. Sycara, Spinning the owl-s process model toward the verification of the owl-s process models, in: Proceedings of the ISWC 2004 Workshop on Semantic Web Services SWS 2004, 2004.
-
-
-
-
5
-
-
0031650188
-
-
N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proceedings of IEEE Symposium on Research in Security and Privacy, 1998, pp. 86-99.
-
-
-
-
7
-
-
0022769976
-
Graph based algorithms for boolean function manipulation
-
Bryant R.E. Graph based algorithms for boolean function manipulation. IEEE Transactions on Computers 35 8 (1986) 677-691
-
(1986)
IEEE Transactions on Computers
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
8
-
-
0026913667
-
Symbolic boolean manipulation with ordered binary-decision diagrams
-
Bryant R.E. Symbolic boolean manipulation with ordered binary-decision diagrams. ACM Computing Surveys 23 4 (1992) 293-318
-
(1992)
ACM Computing Surveys
, vol.23
, Issue.4
, pp. 293-318
-
-
Bryant, R.E.1
-
10
-
-
33646432858
-
-
E.M. Clarke, S. Jha, W. Marrero, Using state space exploration and a natural deduction style message derivation engine to verify security protocols, in: Proceedings of the IFIP Working Conference on Programming Concepts, and Methods (PROCOMET), 1998.
-
-
-
-
12
-
-
33646411875
-
-
ebXML, ebxml specifications. Available from: .
-
-
-
-
15
-
-
33646399269
-
-
X. Fu, T. Bultan, J. Su, Formal verification of e-services and workflows, in: Proceedings of Workshop (WSeBt 2002), 2002.
-
-
-
-
16
-
-
19944405131
-
-
X. Fu, T. Bultan, J. Su, Analysis of interacting bpel web services, in: Proceedings of ACM WWW 2004, 2004.
-
-
-
-
17
-
-
17644389760
-
-
X. Fu, T. Bultan, J. Su, Model checking xml manipulating software, in: Proceedings of 2004 International Symposium on Software Testing and Analysis (ISSTA 2004), 2004.
-
-
-
-
18
-
-
33646417762
-
-
X. Fu, T. Bultan, J. Su, Wsat: a tool for formal analysis of web services, in: Proceedings of 16th International Conference on Computer Aided Verification (CAV 2004), 2004.
-
-
-
-
19
-
-
33646398429
-
-
J.A. Garay, M. Jakobsson, P. Mckenzie, Abuse-free optimistic contract signing, Advances in Cryptology (1996).
-
-
-
-
20
-
-
33646397684
-
-
N. Heintze, J.D. Tygar, J.M. Wing, H.C. Wong, Model checking electronic commerce protocols, in: Proceedings of USENIX Worksop on Electronic Commerce, 1996.
-
-
-
-
22
-
-
18744380149
-
Modelling and verifying web service orchestration by means of the concurrency workbench
-
ACM, New York
-
Koshkina M., and van Bruegel F. Modelling and verifying web service orchestration by means of the concurrency workbench. Proceeding of ACM sigsoft SEN (2004), ACM, New York 1-9
-
(2004)
Proceeding of ACM sigsoft SEN
, pp. 1-9
-
-
Koshkina, M.1
van Bruegel, F.2
-
23
-
-
0037209815
-
Analysis of security protocols as open systems
-
Martinelli F. Analysis of security protocols as open systems. Theoretical Computer Science 290 1 (2003)
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
-
-
Martinelli, F.1
-
24
-
-
33646387831
-
-
K.L. McMillan, The SMV system, February 1992. Available from: .
-
-
-
-
25
-
-
70349896736
-
-
S. Narayana, S.A. McIlraith, Simulation, verification and automated composition of web services, in: Proceedings of the 11th International WWW Conference 2002, 2002.
-
-
-
-
26
-
-
85047040703
-
-
A. Pnueli, The temporal logic of programs, in: Proceedings of 18th IEEE Symposium on the Foundations of Computer Science, 1977, pp. 46-57.
-
-
-
-
27
-
-
33646390489
-
-
K. Schmidt, C. Stahl, A petri net semantic for bpel4ws validation and application, in: Proceedings of the 11th Workshop on Algorithms and Toolsfor Petri Nets (AWPN 04), 2004.
-
-
-
-
28
-
-
0032623470
-
Security protocols over open network and distributed systems: formal methods for their analysis, design and verification
-
Grizalis S., Spinellis D., and Georgiais P. Security protocols over open network and distributed systems: formal methods for their analysis, design and verification. Computer Communications 8 22 (1999) 697-709
-
(1999)
Computer Communications
, vol.8
, Issue.22
, pp. 697-709
-
-
Grizalis, S.1
Spinellis, D.2
Georgiais, P.3
-
29
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
Shmatikov V., and Mitchell J.C. Finite-state analysis of two contract signing protocols. Theoretical Computer Science 2 283 (2002) 419-450
-
(2002)
Theoretical Computer Science
, vol.2
, Issue.283
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
-
31
-
-
33646417444
-
-
XML, Xml specifications. Available from: .
-
-
-
-
32
-
-
33646389054
-
-
OWL. Available from: .
-
-
-
-
33
-
-
33646391048
-
-
WSDL, Web Services Description Language (WSDL) 1.1, 2002. Available from: .
-
-
-
-
34
-
-
33646409673
-
-
SOAP. Simple Object Access Protocol (SOAP) 1.1, 2000. Available from: .
-
-
-
-
35
-
-
33646391607
-
-
RosettaNet, 2001. A lingua franca for e-business. Available from: .
-
-
-
|