Timed Interpreted Systems as a New Agent-Based Formalism for Verification of Timed Security Protocols

被引:0
|
作者
Zbrzezny, Agnieszka M. [1 ,2 ]
Siedlecka-Lamch, Olga [3 ]
Szymoniak, Sabina [3 ]
Zbrzezny, Andrzej [4 ]
Kurkowski, Miroslaw [5 ]
机构
[1] Faculty of Design, SWPS University, Chodakowska 19/31, Warsaw,03-815, Poland
[2] Faculty of Mathematics and Computer Science, University of Warmia and Mazury, Olsztyn,10-710, Poland
[3] Department of Computer Science, Czestochowa University of Technology, Dabrowskiego 73, Czestochowa,42-200, Poland
[4] Department of Mathematics and Computer Science, Jan Dlugosz University in Czestochowa, Armii Krajowej 13/15, Czestochowa,42-200, Poland
[5] Institute of Computer Science, Cardinal St. Wyszynski University, Woycickiego 1/3, Warsaw,01-938, Poland
来源
Applied Sciences (Switzerland) | 2024年 / 14卷 / 22期
关键词
D O I
10.3390/app142210333
中图分类号
学科分类号
摘要
62
引用
收藏
相关论文
共 50 条
  • [1] Timed Automata Based Model Checking of Timed Security Protocols
    Kurkowski, Miroslaw
    Penczek, Wojciech
    [J]. FUNDAMENTA INFORMATICAE, 2009, 93 (1-3) : 245 - 259
  • [2] A Formal Specification and Verification Framework for Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Sun, Meng
    Dong, Jin-Song
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 44 (08) : 725 - 746
  • [3] Automated Verification of Timed Security Protocols with Clock Drift
    Li, Li
    Sun, Jun
    Dong, Jin Song
    [J]. FM 2016: FORMAL METHODS, 2016, 9995 : 513 - 530
  • [4] On Backward-Style Verification for Timed Anonymity of Security Protocols
    Kawabe, Yoshinobu
    Ito, Nobuhiro
    [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [5] Using Backward Induction Techniques in (Timed) Security Protocols Verification
    Kurkowski, Miroslaw
    Siedlecka-Lamch, Olga
    Dudek, Pawel
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2013, 2013, 8104 : 265 - 276
  • [6] Timed Analysis of Security Protocols
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    Kurkowski, Miroslaw
    [J]. INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY - ISAT 2016 - PT II, 2017, 522 : 53 - 63
  • [7] Timed analysis of security protocols
    Corin, R.
    Etalle, S.
    Hartel, P.
    Mader, A.
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (06) : 619 - 645
  • [8] TAuth: Verifying Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
  • [9] Verifying Parameterized Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    [J]. FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
  • [10] On the Verification of Detectability for Timed Systems
    Dong, Weijie
    Yin, Xiang
    Zhang, Kuize
    Li, Shaoyuan
    [J]. 2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 3752 - 3758