Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

Amirhosein Sayyadabdi; Behrouz Tork Ladani; Bahman Zamani

Volume 14, Issue 3 , October 2022, , Pages 61-69

https://doi.org/10.22042/isecure.2022.14.3.7

Abstract
  Android is a widely used operating system that employs a permission-based access control model. The Android Permissions System (APS) is responsible for mediating application resource requests. APS is a critical component of the Android security mechanism; hence, a failure in the design of APS can potentially ...  Read More

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

M. Pourpouneh; R. Ramezanian

Volume 8, Issue 1 , January 2016, , Pages 3-24

https://doi.org/10.22042/isecure.2016.8.1.1

Abstract
  In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in ...  Read More

A model for specification, composition and verification of access control policies and its application to web services

Z. Derakhshandeh; B. Tork Ladani

Volume 3, Issue 2 , July 2011, , Pages 103-120

https://doi.org/10.22042/isecure.2015.3.2.4

Abstract
  Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access ...  Read More