scholarly journals Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders

Author(s):  
Vivek Nigam ◽  
Carolyn Talcott ◽  
Abraão Aires Urquiza
Author(s):  
Max Kanovich ◽  
Tajana Ban Kirigin ◽  
Vivek Nigam ◽  
Andre Scedrov ◽  
Carolyn Talcott

2008 ◽  
Vol 75 (1) ◽  
pp. 3-51 ◽  
Author(s):  
Bruno Blanchet ◽  
Martín Abadi ◽  
Cédric Fournet

Author(s):  
Manas Kumar Yogi ◽  
◽  
L. Yamuna ◽  
P. Surayanka ◽  
◽  
...  

Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Sign in / Sign up

Export Citation Format

Share Document