메뉴 건너뛰기




Volumn , Issue , 2010, Pages 210-215

A framework for probabilistic model checking of security protocols using coloured stochastic activity networks and PDETool

Author keywords

Coloured stochastic activity networks (CSANs); PDETool; PRISM; Probabilistic model checking; Security protocols

Indexed keywords

ELECTRONIC TECHNOLOGIES; ENGINEERING METHODOLOGY; NEEDHAM-SCHROEDER; PDETOOL; PROBABILISTIC MODEL CHECKING; SECURITY PROTOCOLS; STATE SPACE; STOCHASTIC ACTIVITY NETWORKS; STOCHASTIC PETRI NETS; TMN PROTOCOL;

EID: 79953897671     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISTEL.2010.5734026     Document Type: Conference Paper
Times cited : (4)

References (21)
  • 3
    • 16244379026 scopus 로고    scopus 로고
    • Coloured stochastic activity networks: Definitions and behaviour
    • Bradford, UK. July 7-8
    • M. Abdollahi, Azgomi and A. Movaghar, "Coloured stochastic activity networks: definitions and behaviour," Proc. of the UKPEW'04, Bradford, UK. July 7-8, 2004, pp. 297-308.
    • (2004) Proc. of the UKPEW'04 , pp. 297-308
    • Azgomi, M.A.1    Movaghar, A.2
  • 4
    • 70350331967 scopus 로고    scopus 로고
    • PDETool: A multi-formalism modeling tool for discrete-event systems based on SDES description
    • A. Khalili, A. Jalaly Bidgoly and M. Abdollahi Azgomi, "PDETool: a multi-formalism modeling tool for discrete-event systems based on SDES description," LNCS, vol. 5606, 2009, pp. 343-352.
    • (2009) LNCS , vol.5606 , pp. 343-352
    • Khalili, A.1    Bidgoly, A.J.2    Azgomi, M.A.3
  • 5
    • 84863981780 scopus 로고    scopus 로고
    • PRISM: Probabilistic symbolic model checker
    • LNCS, Springer
    • M. Kwiatkowska, G. Norman, D. Parker, "PRISM: probabilistic symbolic model checker," Proc. of the TOOLS'02, LNCS, vol. 2324, Springer, 2002, pp. 200-204.
    • (2002) Proc. of the TOOLS'02 , vol.2324 , pp. 200-204
    • Kwiatkowska, M.1    Norman, G.2    Parker, D.3
  • 6
    • 67651160007 scopus 로고    scopus 로고
    • An integrated framework for security protocol analysis
    • March 18-20, Japan, Tokyo
    • M. Olszewski, L. Cyra, "An integrated framework for security protocol analysis," Proc. of the ASIACCS'08, March 18-20, Japan, Tokyo, 2008.
    • (2008) Proc. of the ASIACCS'08
    • Olszewski, M.1    Cyra, L.2
  • 7
    • 26444497860 scopus 로고    scopus 로고
    • The A VISP A tool for the automated validation of internet security protocols and applications
    • LNCS
    • A. Armando, et al., "The A VISP A tool for the automated validation of internet security protocols and applications," Proc. of the CAV'05, LNCS, vol. 3576, 2005.
    • (2005) Proc. of the CAV'05 , vol.3576
    • Armando, A.1
  • 8
    • 70349664738 scopus 로고    scopus 로고
    • AVISPA in the validation of ambient intelligence scenarios
    • A. Munoz, A. Mana, D. Serrano, "AVISPA in the validation of ambient intelligence scenarios," Proc. of the ARES'09, 2009, pp. 420-426.
    • (2009) Proc. of the ARES'09 , pp. 420-426
    • Munoz, A.1    Mana, A.2    Serrano, D.3
  • 9
    • 48249158246 scopus 로고    scopus 로고
    • Modeling and analysis of security protocols using role-based specifications and Petri nets
    • LNCS, Springer
    • R. Bouroulet and et al., "Modeling and analysis of security protocols using role-based specifications and Petri nets," Proc. of Petri Nets'08, LNCS, vol. 5062, Springer, 2008, pp. 72-91.
    • (2008) Proc. of Petri Nets'08 , vol.5062 , pp. 72-91
    • Bouroulet, R.1
  • 11
    • 40149109757 scopus 로고    scopus 로고
    • A framework for compositional verification of security protocols
    • S. Andova and et al., "A framework for compositional verification of security protocols," Information and Computation, vol 206, no. 2-4, 2008, pp. 425-459.
    • (2008) Information and Computation , vol.206 , Issue.2-4 , pp. 425-459
    • Andova, S.1
  • 13
    • 45149131442 scopus 로고    scopus 로고
    • Modeling and verification of authentication using enhanced net semantics of security protocol language
    • IEEE CS Press
    • R. Bouroulet, H. Klaudel, E. Pelz, "Modeling and verification of authentication using enhanced net semantics of security protocol language," Proc. of the ACSD'06, IEEE CS Press, 2006, pp. 179-188.
    • (2006) Proc. of the ACSD'06 , pp. 179-188
    • Bouroulet, R.1    Klaudel, H.2    Pelz, E.3
  • 14
    • 38849110077 scopus 로고    scopus 로고
    • Efficient evaluation of CSAN models by state space analysis methods
    • Oct. 29-Nov. 1, IEEE CS Press
    • M. Abdollahi, Azgomi and A. Movaghar, "Efficient evaluation of CSAN models by state space analysis methods," Proc. of the ICSEA'06, Oct. 29-Nov. 1, IEEE CS Press, 2006.
    • (2006) Proc. of the ICSEA'06
    • Azgomi, M.A.1    Movaghar, A.2
  • 16
    • 77952537829 scopus 로고    scopus 로고
    • URL
    • "PDETool Homepage," URL: http://pdeLiust.ac.ir/projects/ pdetool.htrnl.
    • PDETool Homepage
  • 17
    • 33646404908 scopus 로고    scopus 로고
    • Quantitative analysis with the probabilistic model checker PRISM
    • Elsevier
    • M. Kwiatkowska, G. Norman and D. Parker, "Quantitative analysis with the probabilistic model checker PRISM," ENTCS, vol. 153, no. 2, Elsevier, 2005, pp. 5-31.
    • (2005) ENTCS , vol.153 , Issue.2 , pp. 5-31
    • Kwiatkowska, M.1    Norman, G.2    Parker, D.3
  • 18
    • 0043001070 scopus 로고    scopus 로고
    • URL
    • "PRISM Web Site," URL: www.cs.bham.ac.ukI-dxp/prism.
    • PRISM Web Site
  • 20
    • 0035671447 scopus 로고    scopus 로고
    • Stochastic activity networks: A new definition and some properties
    • A. Movaghar, "Stochastic activity networks: a new definition and some properties," Scientia Iranica, vol. 8, no., 4, 2001, pp. 303-311.
    • (2001) Scientia Iranica , vol.8 , Issue.4 , pp. 303-311
    • Movaghar, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.