245 research outputs found

    PSF : a process specification formalism

    Get PDF

    Generalizing Needham-Schroeder-Lowe for multi-party authentication

    Get PDF

    Generalizing Needham-Schroeder-Lowe for multi-party authentication

    Get PDF

    Delayed choice for process algebra with abstraction

    Get PDF
    The delayed choice is an operator which serves to combine linear time and branching time within one process algebra. We study this operator in a theory with abstraction, more precisely, in a setting considering branching bisimulation. We show its use in scenario specifications and in verification to reduce irrelevant branching structure of a process

    Why men (and octopuses) cannot juggle a four ball cascade

    Get PDF

    Syntax requirements of message sequence charts

    Get PDF
    A set of syntax requirements of MSC is discussed and formalized. The treatment is restricted to Basic MSCs without conditions. Syntax requirements of communication events in Basic MSCs are discussed and formalized. The formalization is syntax directed and based on functions and predicates

    Core security requirements of DRM systems

    Get PDF

    Active Re-identification Attacks on Periodically Released Dynamic Social Graphs

    Full text link
    Active re-identification attacks pose a serious threat to privacy-preserving social graph publication. Active attackers create fake accounts to build structural patterns in social graphs which can be used to re-identify legitimate users on published anonymised graphs, even without additional background knowledge. So far, this type of attacks has only been studied in the scenario where the inherently dynamic social graph is published once. In this paper, we present the first active re-identification attack in the more realistic scenario where a dynamic social graph is periodically published. The new attack leverages tempo-structural patterns for strengthening the adversary. Through a comprehensive set of experiments on real-life and synthetic dynamic social graphs, we show that our new attack substantially outperforms the most effective static active attack in the literature by increasing the success probability of re-identification by more than two times and efficiency by almost 10 times. Moreover, unlike the static attack, our new attack is able to remain at the same level of effectiveness and efficiency as the publication process advances. We conduct a study on the factors that may thwart our new attack, which can help design graph anonymising methods with a better balance between privacy and utility

    Message sequence charts in the software engineering process

    Get PDF
    The software development process benefits from the use of Message Sequence Charts (MSC), which is a graphical language for displyaing the interaction behaviour of a system. We describe canonical applications of MSC independent of any software development methodology. We illustrate the use of MSC with a case study: the Meeting Scheduler
    • …
    corecore