Theoretical Computer Science
Computer-aided verification of coordinating processes: the automata-theoretic approach
Computer-aided verification of coordinating processes: the automata-theoretic approach
Access control in virtual environments
VRST '97 Proceedings of the ACM symposium on Virtual reality software and technology
Team automata for groupware systems
GROUP '97 Proceedings of the international ACM SIGGROUP conference on Supporting group work: the integration challenge
IEEE Transactions on Software Engineering
Flexible meta access-control for collaborative applications
CSCW '98 Proceedings of the 1998 ACM conference on Computer supported cooperative work
An access control framework for multi-user collaborative environments
GROUP '99 Proceedings of the international ACM SIGGROUP conference on Supporting group work
ACM Transactions on Information and System Security (TISSEC)
MOPS: an infrastructure for examining security properties of software
Proceedings of the 9th ACM conference on Computer and communications security
Synchronizations in Team Automata for Groupware Systems
Computer Supported Cooperative Work
Towards Team-Automata-Driven Object-Oriented Collaborative Work
Formal and Natural Computing - Essays Dedicated to Grzegorz Rozenberg [on occasion of his 60th birthday, March 14, 2002]
Classification of Security Properties (Part I: Information Flow)
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Formal Security Analysis with Interacting State Machines
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
A Compositional Trace-Based Semantics for Probabilistic Automata
CONCUR '95 Proceedings of the 6th International Conference on Concurrency Theory
Proceedings of the 11th USENIX Security Symposium
DEXA '02 Proceedings of the 13th International Workshop on Database and Expert Systems Applications
I/O Automaton Models and Proofs for Shared-Key Communication Systems
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
HIERARCHICAL CORRECTNESS PROOFS FOR DISTRIBUTED ALGORITHMS
HIERARCHICAL CORRECTNESS PROOFS FOR DISTRIBUTED ALGORITHMS
A universally configurable architecture for taskflow-oriented design of a distributed collaborative computing environment
Team automata for spatial access control
ECSCW'01 Proceedings of the seventh conference on European Conference on Computer Supported Cooperative Work
Spin model checker, the: primer and reference manual
Spin model checker, the: primer and reference manual
Isabelle/HOL: a proof assistant for higher-order logic
Isabelle/HOL: a proof assistant for higher-order logic
New directions in cryptography
IEEE Transactions on Information Theory
Electronic Notes in Theoretical Computer Science (ENTCS)
A team automaton scenario for the analysis of security properties of communication protocols
Journal of Automata, Languages and Combinatorics
Hi-index | 0.00 |
In [Kleijn, J., Team Automata for CSCW - A Survey -, Petri Net Technology for Communication-Based Systems-Advances in Petri Nets, LNCS 2472, Springer, 2003, 295-320], Kleijn presented a survey of the use of team automata for the specification and analysis of phenomena from the field of computer supported cooperative work, in particular notions related to groupware systems. In this paper we present a survey of the use of team automata for the specification and analysis of some issues from the field of security. In particular, we show how team automata can adequately be used to model and verify various access control policies, multicast/broadcast communication protocols, and general (cryptographic) communication protocols.