scholarly journals A Pi-calculus-based Approach for the Verification of UML2 Sequence Diagrams

Author(s):  
Aissam Belghiat ◽  
Allaoua Chaoui
Author(s):  
Matthew Hennessy
Keyword(s):  

2014 ◽  
Vol 36 (6) ◽  
pp. 1261-1266
Author(s):  
Xiang-Ning LI ◽  
Ke-Gang HAO ◽  
Xiao-Qun GUO
Keyword(s):  

2021 ◽  
Vol 180 ◽  
pp. 502-506
Author(s):  
Atif Mashkoor ◽  
Alexander Egyed

Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


Author(s):  
Neville A. Stanton ◽  
James W. Brown ◽  
Kirsten M. A. Revell ◽  
Jisun Kim ◽  
Joy Richardson ◽  
...  

AbstractDesign of appropriate interaction and human–machine interfaces for the handover of control between vehicle automation and human driver is critical to the success of automated vehicles. Problems in this interfacing between the vehicle and driver have led, in some cases, to collisions and fatalities. In this project, Operator Event Sequence Diagrams (OESDs) were used to design the handover activities to and from vehicle automation. Previous work undertaken in driving simulators has shown that the OESDs can be used to anticipate the likely activities of drivers during the handover of vehicle control. Three such studies showed that there was a strong correlation between the activities drivers represented in OESDs and those observed from videos of drivers in the handover process, in driving simulators. For the current study, OESDs were constructed during the design of the interaction and interfaces for the handover of control to and from vehicle automation. Videos of drivers during the handover were taken on motorways in the UK and compared with the predictions from the OESDs. As before, there were strong correlations between those activities anticipated in the OESDs and those observed during the handover of vehicle control from automation to the human driver. This means that OESDs can be used with some confidence as part of the vehicle automation design process, although validity generalisation remains an important goal for future research.


Author(s):  
Caimei Wang ◽  
Yan Xiong ◽  
Wenchao Huang ◽  
Huihua Xia ◽  
Jianmeng Huang

Electronics ◽  
2021 ◽  
Vol 10 (13) ◽  
pp. 1608
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture and highlights the need for robust authentication and authorization mechanisms to provide secure services access and sharing between D2D users. Therefore, this paper proposes a D2D level security solution that comprises two security protocols, namely, the D2D Service security (DDSec) and the D2D Attributes and Capability security (DDACap) protocols, to provide security for access, caching and sharing data in network-assisted and non-network-assisted D2D communications scenarios. The proposed solution applies Identity-based Encryption (IBE), Elliptic Curve Integrated Encryption Scheme (ECIES) and access control mechanisms for authentication and authorization procedures. We formally verified the proposed protocols using ProVerif and applied pi calculus. We also conducted a security analysis of the proposed protocols.


Sign in / Sign up

Export Citation Format

Share Document