Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

M. Pourpouneh; R. Ramezanian

Volume 8, Issue 1 , Winter and Spring 2016, , Pages 3-24

http://dx.doi.org/10.22042/isecure.2016.8.1.1

Abstract
  In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in ...  Read More

2. A model for specification, composition and verification of access control policies and its application to web services

Z. Derakhshandeh; B. Tork Ladani

Volume 3, Issue 2 , Summer and Autumn 2011, , Pages 103-120

http://dx.doi.org/10.22042/isecure.2015.3.2.4

Abstract
  Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access ...  Read More