{"title":"Establishing the Price of Privacy in Federated Data Trading","authors":"Kangsoo Jung, Sayan Biswas, C. Palamidessi","doi":"10.1007/978-3-030-91631-2_13","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_13","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116096881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kanovich, Tajana Ban Kirigin, Vivek Nigam, A. Scedrov, C. Talcott
{"title":"On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report","authors":"M. Kanovich, Tajana Ban Kirigin, Vivek Nigam, A. Scedrov, C. Talcott","doi":"10.1007/978-3-030-91631-2_14","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_14","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abigail A Siegel, Mia Santomauro, Tristan Dyer, Tim Nelson, S. Krishnamurthi
{"title":"Prototyping Formal Methods Tools: A Protocol Analysis Case Study","authors":"Abigail A Siegel, Mia Santomauro, Tristan Dyer, Tim Nelson, S. Krishnamurthi","doi":"10.1007/978-3-030-91631-2_22","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_22","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126625222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Key Management Policies in Strand Spaces","authors":"R. Focardi, F. Luccio","doi":"10.1007/978-3-030-91631-2_10","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_10","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132043951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Jamroga, P. Ryan, Steve A. Schneider, C. Schürmann, Philip B. Stark
{"title":"A Declaration of Software Independence","authors":"W. Jamroga, P. Ryan, Steve A. Schneider, C. Schürmann, Philip B. Stark","doi":"10.1007/978-3-030-91631-2_11","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_11","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114688360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ahmadpanah, Musard Balliu, Daniel Hedin, L. Olsson, A. Sabelfeld
{"title":"Securing Node-RED Applications","authors":"M. Ahmadpanah, Musard Balliu, Daniel Hedin, L. Olsson, A. Sabelfeld","doi":"10.1007/978-3-030-91631-2_1","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_1","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124934536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Methods and Mathematical Intuition","authors":"Dale M. Johnson","doi":"10.1007/978-3-030-91631-2_12","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_12","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124896674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bruni, Marco Carbone, Rosario Giustolisi, S. Mödersheim, C. Schürmann
{"title":"Security Protocols as Choreographies","authors":"A. Bruni, Marco Carbone, Rosario Giustolisi, S. Mödersheim, C. Schürmann","doi":"10.1007/978-3-030-91631-2_5","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_5","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130046190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday","authors":"","doi":"10.1007/978-3-030-91631-2","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}