Analysis and testing of Web applications
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
Semantic Issues in the Verification of Agent Communication Languages
Autonomous Agents and Multi-Agent Systems
Using SPIN to Verify Security Properties of Cryptographic Protocols
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Integrating Real Time into Spin: A Prototype Implementation
FORTE XI / PSTV XVIII '98 Proceedings of the FIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XI) and Protocol Specification, Testing and Verification (PSTV XVIII)
Lectures on Petri Nets I: Basic Models, Advances in Petri Nets, the volumes are based on the Advanced Course on Petri Nets
An Object-Oriented Web Test Model for Testing Web Applications
APAQS '00 Proceedings of the The First Asia-Pacific Conference on Quality Software (APAQS'00)
Web Applications Design and Maintenance Using Symbolic Model Checking
CSMR '03 Proceedings of the Seventh European Conference on Software Maintenance and Reengineering
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Case Study: Online Banking Security
IEEE Security and Privacy
Specification and verification of data-driven Web applications
Journal of Computer and System Sciences
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Model Checking-based Verification of Web Application
ICECCS '07 Proceedings of the 12th IEEE International Conference on Engineering Complex Computer Systems
Timed analysis of security protocols
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Spin model checker, the: primer and reference manual
Spin model checker, the: primer and reference manual
Analyzing websites for user-visible security design flaws
Proceedings of the 4th symposium on Usable privacy and security
25 Years of Model Checking
A Model Checking-based Method for Verifying Web Application Design
Electronic Notes in Theoretical Computer Science (ENTCS)
Analyzing contract robustness through a model of commitments
AOSE'10 Proceedings of the 11th international conference on Agent-oriented software engineering
Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach
IEEE Transactions on Services Computing
Hi-index | 0.00 |
In this paper we model message exchange in a trusted multi-agent system (MAS). Modelling such MAS allows us to study and analyse agents' behaviour. We apply our model in context where secure agent communication is paramount, i.e. within the context of data-sensitive and time-sensitive web-applications. As a result we aim to reduce design errors of such applications, analyse agents' behaviour in secure and compromised web applications and consequently improve security, reliability and usability. We use model checking to study the pattern of message exchange among agents. As a verification technique, model checking assists in finding flaws and simplifying the design of an application. We simulate a secure transaction between a client and a server. Our model is realistic; we augment it by introducing discrete time, web-session management, and authentication.