Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Keywords = Verification
Number of Articles: 3
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System
Volume 14, Issue 3 , October 2022, , Pages 61-69
Abstract
Android is a widely used operating system that employs a permission-based access control model. The Android Permissions System (APS) is responsible for mediating application resource requests. APS is a critical component of the Android security mechanism; hence, a failure in the design of APS can potentially ... Read MoreA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
Volume 8, Issue 1 , January 2016, , Pages 3-24
Abstract
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in ... Read MoreA model for specification, composition and verification of access control policies and its application to web services
Volume 3, Issue 2 , July 2011, , Pages 103-120