메뉴 건너뛰기




Volumn 7, Issue 7, 2012, Pages 1488-1495

Probabilistic attack scenarios to evaluate policies over communication protocols

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK SCENARIOS; MODEL CHECKER; NON-FUNCTIONAL REQUIREMENTS; PROBABILISTIC MODEL-CHECKING; QUALITATIVE AND QUANTITATIVE ANALYSIS; QUALITATIVE ASSESSMENTS; SECURE REAL-TIME TRANSPORT PROTOCOLS; SECURITY AND PERFORMANCE; SECURITY ATTACKS; SECURITY THREATS; STREAMING PROTOCOLS; SYSTEM MODELS;

EID: 84865127157     PISSN: 1796217X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jsw.7.7.1488-1495     Document Type: Article
Times cited : (6)

References (20)
  • 3
    • 10044293457 scopus 로고    scopus 로고
    • Comparing Passwords, Tokens, and Biometrics for User Authentication
    • L. OGorman, "Comparing Passwords, Tokens, and Biometrics for User Authentication, " Proceedings of the IEEE, vol. 91, no. 12, pp. 2021-2040, 2003.
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • OGorman, L.1
  • 7
    • 0037036274 scopus 로고    scopus 로고
    • Automatic verification of real-time systems with discrete probability distributions
    • M. Kwiatkowska, G. Norman, R. Segala, and J. Sproston, "Automatic verification of real-time systems with discrete probability distributions, " Theor. Comput. Sci., vol. 282, no. 1, pp. 101-150, 2002.
    • (2002) Theor. Comput. Sci , vol.282 , Issue.1 , pp. 101-150
    • Kwiatkowska, M.1    Norman, G.2    Segala, R.3    Sproston, J.4
  • 8
    • 70350543796 scopus 로고    scopus 로고
    • Aspier: An automated framework for verifying security protocol implementations
    • in
    • S. Chaki and A. Datta, "Aspier: An automated framework for verifying security protocol implementations, " in Computer Security Foundations Workshop, 2009, pp. 172-185.
    • (2009) Computer Security Foundations Workshop , pp. 172-185
    • Chaki, S.1    Datta, A.2
  • 10
    • 79953897671 scopus 로고    scopus 로고
    • A framework for probabilistic model checking of security protocols using coloured stochastic activity networks and pdetool
    • in
    • M. Akbarzadeh and M. Azgomi, "A framework for probabilistic model checking of security protocols using coloured stochastic activity networks and pdetool, " in Telecommunications (IST), 2010 5th International Symposium on, dec. 2010, pp. 210-215.
    • (2010) Telecommunications (IST), 5th International Symposium on, dec. 2010 , pp. 210-215
    • Akbarzadeh, M.1    Azgomi, M.2
  • 11
    • 33845202577 scopus 로고    scopus 로고
    • Analysis of probabilistic contract signing
    • G. Norman and V. Shmatikov, "Analysis of probabilistic contract signing, " Journal of Computer Security, vol. 14, no. 6, pp. 561-589, 2006.
    • (2006) Journal of Computer Security , vol.14 , Issue.6 , pp. 561-589
    • Norman, G.1    Shmatikov, V.2
  • 15
    • 84865144783 scopus 로고    scopus 로고
    • last visited: June
    • U. Team, "UPPAAL-, " http://http://www.uppaal.org, last visited: June 2011.
    • (2011) Uppaal
    • Team, U.1
  • 16
    • 79959950872 scopus 로고    scopus 로고
    • Nims information security threat methodology
    • Mitre, Center for Advanced Aviation System Development, McLean, Virgini, August
    • M. D. Abrams, "Nims information security threat methodology, " MITRE, Center for Advanced Aviation System Development, McLean, Virgini, Mitre Technical Report MTR 98 W000009, August 1998.
    • (1998) Mitre Technical Report MTR 98 W000009
    • Abrams, M.D.1
  • 17
    • 0003161907 scopus 로고
    • An analysis of stochastic shortest path problems
    • August
    • D. P. Bertsekas and J. N. Tsitsiklis, "An analysis of stochastic shortest path problems, " Math. Oper. Res., vol. 16, pp. 580-595, August 1991.
    • (1991) Math. Oper. Res. , vol.16 , pp. 580-595
    • Bertsekas, D.P.1    Tsitsiklis, J.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.