Showing 21 - 34 results of 34 for search '"Formal methods"', query time: 0.05s Refine Results
  1. 21
  2. 22

    RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks by Muhammad Tanveer, Saud Alhajaj Aldossari

    Published 2025-01-01
    “…The security of the session is rigorously evaluated using formal methods, including Scyther and the random or real model, alongside informal approaches. …”
    Get full text
    Article
  3. 23

    Ontologies in bioinformatics and systems biology by N. L. Podkolodnyy, O. A. Podkolodnaya

    Published 2016-01-01
    “…Further formalization and ontological accumulation of knowledge and the use of formal methods of analysis can take the entire cycle of research in systems biology to a new technological level.…”
    Get full text
    Article
  4. 24
  5. 25

    THE FORMATION OF THE BUDGET OF THE TV COMPANY METHOD OF VALUATION OF COST OF PRODUCTION by M. Nemirovskaya, A. Uvarova

    Published 2017-04-01
    “…The necessity of applying formalized methods of evaluating labor and resource intensity of production of television programmes of various kinds. …”
    Get full text
    Article
  6. 26

    Formalization of Methods in Criminalistics by L. P. Grynko

    Published 2019-12-01
    “…Accordingly, the purpose of this article is to clarify the methods used to detect and investigate crimes and the possibilities of their formalization in criminalistics. Formalization methods in criminalistics have been considered. …”
    Get full text
    Article
  7. 27

    Novel mobile agent dynamic data integrity protection protocol by LI Peng-fei1, QING Si-han2, MA Heng-tai1, DENG Yong1

    Published 2007-01-01
    “…Integrity characteristics of dynamic data was redefined and classified by attacker capability,and then it was analyzed how to protect truncation attack with collusion.After that,a data protection protocol of free-roaming agent was presented.The protocol used a reverse chained signature to protect the integrity of roaming path,and protected the dy-namic data integrity based on this.Specially,the protocol provided truncation resilience in collusion condition,and its secure property was proved by formal method.…”
    Get full text
    Article
  8. 28

    Research on formal security policy model specification and its formal analysis by LI Li-ping1, QING Si-han1, ZHOU Zhou-yi1, HE Jian-bo1, WEN Hong-zi3

    Published 2006-01-01
    “…Formal method is one of the kernel technologies of developing high security level computer system.But by current formal development method,assurance of security policy model correctness cannot be provided directly using machine proof which is stricter than manual proof,correspondence between security policy model and security functional specification is also hard to achieve.To solve these problems,a new and effective method was proposed for specification constructing and proving by extending the specification technique of security functional specification into the specifica-tion of security policy model.Also,BLP model was specified and analyzed as an example.…”
    Get full text
    Article
  9. 29

    Research on a new network covert channel model in blockchain environment by Yanfeng LI, Liping DING, Jingzheng WU, Qiang CUI, Xuehua LIU, Bei GUAN

    Published 2019-05-01
    “…Blockchain is a decentralized architecture emerging with cryptocurrencies,which is credible and robust.A network covert channel model in blockchain environment was proposed for the first time,which was anti-interference,anti-tamper modification,multi-line communication,receiver anonymity and line independence.The shortcomings of network covert channel in existing network environment could be tackled by the new type of network covert channel,such as characteristic defect.etc.Firstly,A network covert channel model in blockchain environment was presented by formal method,its anti-interference and anti-tamper modification was proved.Then,a blockchain network covert channel scenario using service operation interval time was presented.Finally,the undetectability,robustness and rate of the blockchain network covert channel evaluation vectors was proposed.A theoretical foundation was laid for the practicality of the new type of network covert channel in blockchain.…”
    Get full text
    Article
  10. 30

    Verification of serialising instructions for security against transient execution attacks by Kushal K. Ponugoti, Sudarshan K. Srinivasan, Nimish Mathure

    Published 2023-07-01
    “…The authors provide a formal method solution that addresses the verification of lfence hardware implementation. …”
    Get full text
    Article
  11. 31

    Neighbor Session Solutions for Integrated Routing Protocols by Martin Kontsek, Pavel Segec, Marek Moravcik, Juraj Smiesko

    Published 2024-12-01
    “…Colored Petri nets (CPNs) are selected as a formal method to create a model of each PISC. The following parts deal with a detailed description and analysis of the created Protocol Integration Solution Class models, which are also verified and compared with each other. …”
    Get full text
    Article
  12. 32

    Novel Web Service Selection Model Based on Discrete Group Search by Jie Zhai, Zhiqing Shao, Yi Guo, Haiteng Zhang

    Published 2014-01-01
    “…In our earlier work, we present a novel formal method for the semiautomatic verification of specifications and for describing web service composition components by using abstract concepts. …”
    Get full text
    Article
  13. 33

    Structural levels of the national economic system: management aspect by G. N. Ryazanova, P. S. Tolkachev

    Published 2020-01-01
    “…The analysis has been carried out using general scientific methods: the method of abstraction, historical research methods; formalization method, reconstruction method; based on a systematic approach using the method of forecasting.…”
    Get full text
    Article
  14. 34

    Analysis and forecasting of pet food markets using extrapolation methods by O. Nikolaieva, YE Svishchova, A. Hladka

    Published 2024-06-01
    “…From the variety of formalized methods for forecasting the demand in pet food markets, the authors chose extrapolation methods, namely, methods of trend analysis and adaptive methods of exponential smoothing. …”
    Get full text
    Article