On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report
暂无分享,去创建一个
[1] Tajana Ban Kirigin,et al. Resource-Bounded Intruders in Denial of Service Attacks , 2019, 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).
[2] Ron Koymans,et al. Specifying real-time properties with metric temporal logic , 1990, Real-Time Systems.
[3] Carolyn L. Talcott,et al. Resource and timing aspects of security protocols , 2021, J. Comput. Secur..
[4] Carolyn L. Talcott,et al. Time, computational complexity, and probability in the analysis of distance-bounding protocols , 2017, J. Comput. Secur..
[5] Bowen Alpern,et al. Recognizing safety and liveness , 2005, Distributed Computing.
[6] Carolyn L. Talcott,et al. A rewriting framework and logic for activities subject to regulations , 2017, Math. Struct. Comput. Sci..
[7] Salil P. Vadhan,et al. Computational Complexity , 2005, Encyclopedia of Cryptography and Security.
[8] Max I. Kanovich,et al. Collaborative Planning with Confidentiality , 2011, Journal of Automated Reasoning.
[9] Farhad Arbab,et al. Soft Agents: Exploring Soft Constraints to Model Robust Adaptive Distributed Cyber-Physical Agent Systems , 2015, Software, Services, and Systems.
[10] Joël Ouaknine,et al. Safety Metric Temporal Logic Is Fully Decidable , 2006, TACAS.
[11] Carolyn L. Talcott,et al. Timed Multiset Rewriting and the Verification of Time-Sensitive Distributed Systems , 2016, FORMATS.
[12] Thomas A. Henzinger,et al. Logics and Models of Real Time: A Survey , 1991, REX Workshop.
[13] P. Alam. ‘N’ , 2021, Composites Engineering: An A–Z Guide.
[14] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[15] Herbert B. Enderton,et al. A mathematical introduction to logic , 1972 .
[16] Max I. Kanovich,et al. Bounded Memory Protocols and Progressing Collaborative Systems , 2013, ESORICS.
[17] Philippe Schnoebelen,et al. On the expressivity and complexity of quantitative branching-time temporal logics , 2000, Theor. Comput. Sci..
[18] Peter Csaba Ölveczky,et al. The Real-Time Maude Tool , 2008, TACAS.
[19] Carolyn L. Talcott,et al. Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols , 2015, POST.
[20] Farhad Arbab,et al. Formal Specification and Analysis of Robust Adaptive Distributed Cyber-Physical Systems , 2016, SFM.
[21] Tajana Ban Kirigin,et al. Progressing Collaborative Systems , 2014 .
[22] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[23] John C. Mitchell,et al. A meta-notation for protocol analysis , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[24] KoymansRon. Specifying real-time properties with metric temporal logic , 1990 .
[25] Peter Csaba Ölveczky,et al. Abstraction and Completeness for Real-Time Maude , 2006, WRLA.
[26] Michael R. Clarkson,et al. Hyperproperties , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[27] Carolyn L. Talcott,et al. A Rewriting Framework for Activities Subject to Regulations , 2012, RTA.
[28] Carsten Lutz,et al. Quantitative temporal logics: PSpace and below , 2005, 12th International Symposium on Temporal Representation and Reasoning (TIME'05).
[29] Max I. Kanovich,et al. Bounded memory Dolev-Yao adversaries in collaborative systems , 2014, Inf. Comput..
[30] John C. Mitchell,et al. Multiset rewriting and the complexity of bounded security protocols , 2004, J. Comput. Secur..
[31] Narciso Martí-Oliet,et al. All About Maude - A High-Performance Logical Framework, How to Specify, Program and Verify Systems in Rewriting Logic , 2007, All About Maude.
[32] Rajeev Alur,et al. Decision Problems for Timed Automata: A Survey , 2004, SFM.
[33] Axel Legay,et al. Model Checking Quantitative Linear Time Logic , 2008, QAPL.