A note on denial-of-service in operating systems
IEEE Transactions on Software Engineering
Synthesizing Code for Resource Controllers
IEEE Transactions on Software Engineering - Annals of discrete mathematics, 24
Proving Liveness Properties of Concurrent Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Specifying Concurrent Program Modules
ACM Transactions on Programming Languages and Systems (TOPLAS)
Monitors: an operating system structuring concept
Communications of the ACM
Compact finite difference schemes for ocean models: 1. Ocean waves
Journal of Computational Physics
On Denial-of-Service in Computer Networks
Proceedings of the Second International Conference on Data Engineering
Verifying concurrent processes using temporal logic
Verifying concurrent processes using temporal logic
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Quantifying Network Denial of Service: A Location Service Case Study
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Denial of Service - Panel Discussion
Revised Papers from the 8th International Workshop on Security Protocols
GPCE '07 Proceedings of the 6th international conference on Generative programming and component engineering
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers
FMOODS '08 Proceedings of the 10th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Science of Computer Programming
On the evolution of adversary models in security protocols: or know your friend and foe alike
Proceedings of the 13th international conference on Security protocols
Model-checking DoS amplification for VoIP session initiation
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Guaranteeing access in spite of distributed service-flooding attacks
Proceedings of the 11th international conference on Security Protocols
Towards a formal specification method for enterprise information system security
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Stable availability under denial of service attacks through formal patterns
FASE'12 Proceedings of the 15th international conference on Fundamental Approaches to Software Engineering
Hi-index | 0.00 |
A specification and verification method is presented for preventing denial of service in absence of failures and of integrity violations. The notion of user agreements is introduced, and it is argued that lack of specifications for these agreements and for simultaneity conditions makes it impossible to demonstrate denial-of-service prevention, in spite of demonstrably fair service access. The use of this method is illustrated with an example and it is explained why current methods for specification and verification of safety and liveness properties of concurrent programs do not handle this problem. The proposed specification and verification method is meant to augment current methods for secure system design.