An automata theoretic decision procedure for the propositional mu-calculus
Information and Computation
Modal and temporal logics for processes
Proceedings of the VIII Banff Higher order workshop conference on Logics for concurrency : structure versus automata: structure versus automata
Communication and Concurrency
Securing distributed adaptation
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on programmable networks
Analysis of security protocols as open systems
Theoretical Computer Science
Automated Analysis of Some Security Mechanisms of SCEP
ISC '02 Proceedings of the 5th International Conference on Information Security
LICS '95 Proceedings of the 10th Annual IEEE Symposium on Logic in Computer Science
Automatic Composition of Services with Security Policies
SERVICES '08 Proceedings of the 2008 IEEE Congress on Services - Part I
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
A framework for automatic generation of security controller
Software Testing, Verification & Reliability
Hi-index | 0.00 |
Security is one of the main challenges of service oriented computing. Services need to be loosely coupled, easily accessible and yet provide tight security guarantees enforced by cryptographic protocols. In this paper, we address how to automatically synthesize an orchestrator process able to guarantee the secure composition of electronic services, supporting different communication and cryptographic protocols. We present a theoretical model based on process algebra, partial model checking and logical satisfiability, plus an automated tool implementing the proposed theory.