49 résultats  enregistrer la recherche


  • 1
  • 2
inria-00101104v1  Communication dans un congrès
Yannick ChevalierLaurent VigneronTowards Efficient Automated Verification of Security Protocols
Verification Workshop - VERIFY'01 (in connection with IJCAR'01), Jun 2001, Siena, Italy, 15 p, 2001
...
hal-01224144v1  Communication dans un congrès
Tushant JhaWalid BelkhirYannick ChevalierMichael RusinowitchExpressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata
FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Nov 2015, Goa, India
hal-00759725v1  Communication dans un congrès
Alessandro ArmandoWihem ArsacTigran AvanesovMichele BarlettaAlberto Calvi et al.  The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures
Cormac Flanagan and Barbara Konig. Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, TACAS 2012, Mar 2012, Tallinn, Estonia. Springer, 7214, pp.267-282, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-28756-5_19>
hal-00914778v1  Communication dans un congrès
Walid BelkhirYannick ChevalierMichael RusinowitchFresh-Variable Automata for Service Composition
SYNASC 2013 -15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Sep 2013, Timisoara, Romania. IEEE, 2013
hal-00914779v1  Pré-publication, Document de travail
Walid BelkhirYannick ChevalierMichael RusinowitchGuarded Variable Automata over Infinite Alphabets
29 pages. arXiv admin note: text overlap with arXiv:1302.4205. 2013
hal-00755947v1  Communication dans un congrès
Tigran AvanesovYannick ChevalierMichael RusinowitchMathieu TuruaniTowards the Orchestration of Secured Services under Non-disclosure Policies.
Igor V. Kotenko and Victor A. Skormin. 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, Oct 2012, St. Petersburg, Russia. Springer, 7531, pp.130-145, 2012, Lecture Notes in Computer Science. <10.1007/978-3-642-33704-8_12>
inria-00103807v1  Article dans une revue
Yannick ChevalierRalf KüstersMichael RusinowitchMathieu TuruaniAn NP Decision Procedure for Protocol Insecurity with XOR
Theoretical Computer Science, Elsevier, 2005, Theoretical Computer Science, 338 (1-3), pp.247-274
...
inria-00107545v1  Rapport
Yannick ChevalierLaurent VigneronA Tool for Lazy Verification of Security Protocols
[Intern report] A01-R-140 || chevalier01b, 2001, 10 p
inria-00557707v1  Communication dans un congrès
Yannick ChevalierDenis LugiezMichael RusinowitchTowards an Automatic Analysis of Web Service Security
Konev, Boris and Wolter, Franck. 6th International Symposium on Frontiers of Combining Systems - FroCoS'07, Sep 2007, Liverpool, United Kingdom. Springer, 4720, pp.133-147, 2007, Lecture Notes in Artificial Intelligence; Frontiers of Combining Systems. <10.1007/978-3-540-74621-8_9>
inria-00557710v1  Communication dans un congrès
Yannick ChevalierDenis LugiezMichael RusinowitchVerifying Cryptographic Protocols with Subterms Constraints
Dershowitz, Nachum and Voronkov, Andrei. 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning - LPAR 2007, Oct 2007, Yerevan, Armenia. Springer, 4790, pp.181-195, 2007, Lecture Notes in Artificial Intelligence; Logic for Programming, Artificial Intelligence, and Reasoning. <10.1007/978-3-540-75560-9_15>
...
inria-00070512v1  Rapport
Yannick ChevalierMichael RusinowitchCombining Intruder Theories
[Research Report] RR-5495, INRIA. 2005, pp.37
...
inria-00099889v1  Communication dans un congrès
Yannick ChevalierA Simple Constraint-solving Decision Procedure for Protocols with Exclusive or
Kohlhase, Michael. 18th International Workshop on Unification - UNIF'2004, Jul 2004, Cork, Ireland, 15 p, 2004
inria-00099945v1  Article dans une revue
Yannick ChevalierLaurent VigneronStrategy for Verifying Security Protocols with Unbounded Message Size
Journal of Automated Software Engineering, Springer, 2004, 11 (2), pp.141-166
inria-00099888v1  Communication dans un congrès
Yannick ChevalierLaurent VigneronRule-based Programs describing Internet Security Protocols
Abdennadher, Slim and Ringeissen, Christophe. 5th International Workshop on Rule-Based Programming - RULE'2004, Jun 2004, Aachen, Germany, pp.83-97, 2004
...
inria-00099882v1  Communication dans un congrès
Yannick ChevalierLuca CompagnaJorge CuellarPaul Hankes DrielsmaJacopo Mantovani et al.  A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols
Workshop on Specification and Automated Processing of Security Requirements - SAPS'2004, 2004, Linz, Austria, Austrian Computer Society, 13 p, 2004
inria-00099514v1  Communication dans un congrès
Yannick ChevalierRalf KüstersMichael RusinowitchMathieu TuruaniLaurent VigneronExtending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions
M. Baaz and J. A. Makowsky. Computer Science Logic, 17th International Workshop, CSL 2003, 12th Annual Conference of the EACSL, and 8th Kurt Güdel Colloquium, KGC 2003, Aug 2003, Vienna, Austria, Springer, 2803, pp.128-141, 2003, Lecture Notes in Computer Science
...
hal-00642855v1  Communication dans un congrès
Yannick ChevalierMohammed Anis MekkiMichael RusinowitchOrchestration under Security Constraints
Bernhard K Aichernig and Frank S. de Boer and Marcello M. Bonsangue. Formal Methods for Components and Objects (FMCO 2010), Nov 2010, Graz, Austria. Springer, 6957, 2011, Lecture Notes in Computer Science; Formal Methods for Components and Objects
inria-00432528v1  Communication dans un congrès
Philippe BalbianiYannick ChevalierMarwa El-HouriA Logical Framework for Reasoning about Policies with Trust Negotiations and Workflows in a Distributed Environment
4th International Conference on Risks and Security of Internet and Systems - CRiSIS 2009, Oct 2009, Toulouse, France. IEEE, pp.3-11, 2009, Proceedings of the fourth international conference on Risks and Security of Internet and Systems - CRiSIS 2009. <10.1109/CRISIS.2009.5411983>
...
hal-00641326v1  Communication dans un congrès
Tigran AvanesovYannick ChevalierMohammed Anis MekkiMichael RusinowitchWeb Services Verification and Prudent Implementation
4th SETOP International Workshop on Autonomous and Spontaneous Security, Sep 2011, Leuven, Belgium. Springer, 2012, Lecture Notes in Computer Science; Post-Proceedings of the 4th SETOP International Workshop on Autonomous and Spontaneous Security
  • 1
  • 2