메뉴 건너뛰기




Volumn , Issue , 2007, Pages 8-14

A static verification framework for secure peer-to-peer applications

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED DESIGN; COMPUTER PROGRAMMING LANGUAGES; IDENTIFICATION (CONTROL SYSTEMS); MATHEMATICAL MODELS; SECURITY OF DATA; SPECIFICATIONS;

EID: 34548737170     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIW.2007.11     Document Type: Conference Paper
Times cited : (14)

References (36)
  • 1
    • 35048861871 scopus 로고    scopus 로고
    • Just Fast Keying in the Pi Calculus
    • Proceedings of the 13th European Symposium on Programming ESOP'04, of, Spain
    • Abadi M., Blanchet B., and Fournet C. Just Fast Keying in the Pi Calculus. Proceedings of the 13th European Symposium on Programming (ESOP'04), volume 2986 of Lecture Notes on Computer Science, Spain, 2004.
    • (2004) Lecture Notes on Computer Science , vol.2986
    • Abadi, M.1    Blanchet, B.2    Fournet, C.3
  • 2
    • 0037240812 scopus 로고    scopus 로고
    • Misuse cases: Use cases with hostile intent
    • Alexander, I., Misuse cases: Use cases with hostile intent. IEEE Software, 20, 58-66, 2003.
    • (2003) IEEE Software , vol.20 , pp. 58-66
    • Alexander, I.1
  • 3
    • 34548774558 scopus 로고    scopus 로고
    • Anderson, R, Security Engineering: A guide to Building Dependable Distributed Systems. Wiley Computer Publishing
    • Anderson, R., Security Engineering: A guide to Building Dependable Distributed Systems. Wiley Computer Publishing.
  • 4
    • 34548755076 scopus 로고    scopus 로고
    • AVISPA
    • AVISPA, http://www.avispa-project.org.
  • 6
    • 84905494891 scopus 로고    scopus 로고
    • Improving Computer Security Using Extended Static Checking
    • IEEE CS Press
    • Chess B., Improving Computer Security Using Extended Static Checking, Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2002.
    • (2002) Proc. IEEE Symp. Security and Privacy
    • Chess, B.1
  • 9
  • 10
    • 0141733117 scopus 로고    scopus 로고
    • Modelling Access Policies Using Roles in Requirements Engineering
    • Crook, R., Ince, D., and Nuseibeh, B., Modelling Access Policies Using Roles in Requirements Engineering. Information and Software Technology, 45(14), 979-991, 2003.
    • (2003) Information and Software Technology , vol.45 , Issue.14 , pp. 979-991
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 15
    • 0142156745 scopus 로고    scopus 로고
    • Requirements Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard
    • Proceedings on the International Conference on Conceptual Modelling ER, Springer-Verlag
    • Giorgini, P., Massaci, F., and Mylopoulos, J., Requirements Engineering Meets Security: A Case Study on Modelling Secure Electronic Transactions by VISA and Mastercard, Proceedings on the International Conference on Conceptual Modelling (ER), LNCS 2813, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2813
    • Giorgini, P.1    Massaci, F.2    Mylopoulos, J.3
  • 17
    • 0032623470 scopus 로고    scopus 로고
    • Security Protocols Over Open Networks and Distributed Systems: Formal Methods for their Analysis, Design, and Verification
    • Gritzalis, S., Spinellis, S., Georgiadis P., Security Protocols Over Open Networks and Distributed Systems: Formal Methods for their Analysis, Design, and Verification. Computer Communications, 22(8): 695-707, 1999.
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 695-707
    • Gritzalis, S.1    Spinellis, S.2    Georgiadis, P.3
  • 18
    • 34548744058 scopus 로고    scopus 로고
    • Heitmeyer, C, Applying Practical Formal Methods to the Specification and Analysis of Security Porperties
    • Heitmeyer, C., Applying Practical Formal Methods to the Specification and Analysis of Security Porperties.
  • 20
    • 34548757952 scopus 로고    scopus 로고
    • Jayaram K.R. and Mathur A.P., Software Engineering for Secure Software - State of the Art: A Survey. Technical report of CERIAS (Purdue University) and SERC, 2005.
    • Jayaram K.R. and Mathur A.P., Software Engineering for Secure Software - State of the Art: A Survey. Technical report of CERIAS (Purdue University) and SERC, 2005.
  • 22
    • 35048858856 scopus 로고    scopus 로고
    • Automated Verification of UMLsec Models for Security Requirements
    • Proceedings of the Unified Modelling Language Conference UML, Lisbon, Portugal, Springer-Verlag
    • Jurjens, J. and Shabalin P. Automated Verification of UMLsec Models for Security Requirements, Proceedings of the Unified Modelling Language Conference (UML 2004), Lisbon, Portugal, LNCS, Springer-Verlag. 2004.
    • (2004) LNCS
    • Jurjens, J.1    Shabalin, P.2
  • 23
    • 34548708551 scopus 로고    scopus 로고
    • Lodderstedt, T., Basin, D., and Dorser, J., SecureUML: A UML-based Modelling Language for Model Driven Security, Proceedings on the UML'02 Conference, LNCS 2460, Springer-Verlag.
    • Lodderstedt, T., Basin, D., and Dorser, J., SecureUML: A UML-based Modelling Language for Model Driven Security, Proceedings on the UML'02 Conference, LNCS 2460, Springer-Verlag.
  • 26
    • 23944475544 scopus 로고    scopus 로고
    • When Security Meets Software Engineering: A Case of Modelling Secure Information Systems
    • Mouratidis, H., Giorgini, P., and Manson, G., When Security Meets Software Engineering: A Case of Modelling Secure Information Systems. Information Systems, 30(8), 609-629, 2005.
    • (2005) Information Systems , vol.30 , Issue.8 , pp. 609-629
    • Mouratidis, H.1    Giorgini, P.2    Manson, G.3
  • 28
    • 34548803562 scopus 로고    scopus 로고
    • PEPERS
    • PEPERS. http://www.pepers.org/.
  • 30
    • 24944508565 scopus 로고    scopus 로고
    • Senn D., Basin D. and Caronni G., Firewall Conformance Testing, in TestCom, pp. 226-241, 2005.
    • Senn D., Basin D. and Caronni G., Firewall Conformance Testing, in TestCom, pp. 226-241, 2005.
  • 31
    • 34548734213 scopus 로고    scopus 로고
    • SPIN
    • SPIN. http://spinroot.com/spin/whatispin.html
  • 34
    • 0000848453 scopus 로고
    • An automata-theoretic approach to linear temporal logic
    • Vardi, M.Y., An automata-theoretic approach to linear temporal logic. In Banff Higher Order Workshop, pages 238-266, 1995.
    • (1995) Banff Higher Order Workshop , pp. 238-266
    • Vardi, M.Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.