Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
formal verification
biblio
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
Reactive power
verification tool
transport protocols
tools
Theorem Proving
standards
standard Transport Layer Security handshake
security protocols
security of data
security
Resistance
relative soundness result
algebra
pubcrawl
Protocols
proof assistants
proof argument
pen-and-paper proof
Isabelle/HOL
Isabelle-HOL security
formal verification
constraint-based approach
Compositionality
biblio
From Secure Business Process Modeling to Design-Level Security Verification
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
socio-technical systems
pubcrawl
resilience
Resiliency
SecBPMN2
security
security engineering framework
security of data
security requirements
procedural system descriptions
Stakeholders
system design
system developers
Systems architecture
UML
UMLsec policies
Unified modeling language
Air gaps
organizational aspects
organisational aspects
modeling
Model transformation
Metrics
Human Factors
Human behavior
formal verification
Formal Specification
design-level security verification
composability
business process modeling security
business data processing
BPMN
air traffic management system
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
biblio
A Formal Foundation for Secure Remote Execution of Enclaves
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Microelectronics Security
composability
confidentiality
Enclave Programs
formal verification
integrity
Metrics
Microelectronic Security
pubcrawl
Remote Attestation
resilience
Resiliency
Secure computation
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
Using TLA+ in the Development of a Safety-Critical Fault-Tolerant Middleware
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
safety-critical software
railway safety
railways
Redundancy
Resiliency
safety integrity level 4
safety-critical fault-tolerant middleware
safety-critical industries
safety-critical modules
railway control applications
Software Architecture
software fault tolerance
software quality
software quality metrics
TAS Control Platform
TLA+
trusted platform modules
formal methods
C code
C language
Code Generation
complex algorithms
composability
distributed algorithms
Fault tolerant systems
fault-tolerant distributed algorithms
Algorithm design and analysis
Formal Specification
formal verification
middleware
model checking
property-driven design
pubcrawl
rail traffic control
biblio
Towards an Integrated Model for Safety and Security Requirements of Cyber-Physical Systems
Submitted by grigby1 on Fri, 02/02/2018 - 1:27pm
safety requirements
Unified modeling language
standards
software assurance
security-critical systems
security requirements
security of data
security management
Security Assurance
security
Scalability
Safety-Critical Systems
safety-critical software
certification
Safety management
safety assurance
Safety
requirements engineering
pubcrawl
integrated computational-physical capabilities
formal verification
documentation
cyber-physical systems
Context modeling
composability
compliance assurance
biblio
An IDE for the Design, Verification and Implementation of Security Protocols
Submitted by grigby1 on Wed, 01/10/2018 - 12:19pm
intuitive language AnB
verification
tools
software engineering
security protocols
security of data
secure distributed applications
Resiliency
pubcrawl
Protocols
protocol verification
program verification
program compilers
model checker OFMC
Java
AnBx compiler
integrated development environment
implementation
Generators
formal verification
Formal Specification
formal modelling
formal method tools
encryption
Eclipse-based IDE
design
dependable distributed applications
composability
compiler security
code generator
biblio
Advances and challenges of quantitative verification and synthesis for cyber-physical systems
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Monitoring
Wearable devices
software reliability
Software
self-driving cars
Science of Security
Scalability
safety-critical software
safety critical contexts
robotic assistants
Resiliency
Quantitative Verification
pubcrawl
Probabilistic logic
Policy-Governed Secure Collaboration
Adaptation models
Metrics
Markov processes
internet
implantable devices
Human Factors
Human behavior
formal verification
factory automation systems
cyber-physical systems
composability
collaboration
business-critical contexts
Biomedical monitoring
biblio
Model-Based Attack Tolerance
Submitted by grigby1 on Thu, 12/28/2017 - 1:28pm
message authentication
tools
software-based systems
Robustness
Resiliency
pubcrawl
monitoring method
Monitoring
model-based testing
model-based attack tolerance
Adaptation models
intrusion tolerance
internet
generic approach
formal verification
formal method
composability
authentication Web application
authentication
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »