Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice

Timed automata are a common formalism for the verification of concurrent systems subject to timing constraints. They extend finite-state automata with clocks, that constrain the system behavior in locations, and to take transitions. While timed automata were originally designed for safety (in the wi...

Full description

Saved in:
Bibliographic Details
Published inACM computing surveys Vol. 55; no. 6; pp. 1 - 36
Main Authors Arcile, Johan, André, Étienne
Format Journal Article
LanguageEnglish
Published New York, NY ACM 31.07.2023
Association for Computing Machinery
Subjects
Online AccessGet full text
ISSN0360-0300
1557-7341
DOI10.1145/3534967

Cover

Loading…
Abstract Timed automata are a common formalism for the verification of concurrent systems subject to timing constraints. They extend finite-state automata with clocks, that constrain the system behavior in locations, and to take transitions. While timed automata were originally designed for safety (in the wide sense of correctness w.r.t. a formal property), they were progressively used in a number of works to guarantee security properties. In this work, we review works studying security properties for timed automata over the past two decades. We notably review theoretical works, with a particular focus on opacity, as well as more practical works, with a particular focus on attack trees and their extensions. We derive main conclusions concerning open perspectives, as well as tool support.
AbstractList Timed automata are a common formalism for the verification of concurrent systems subject to timing constraints. They extend finite-state automata with clocks, that constrain the system behavior in locations, and to take transitions. While timed automata were originally designed for safety (in the wide sense of correctness w.r.t. a formal property), they were progressively used in a number of works to guarantee security properties. In this work, we review works studying security properties for timed automata in the last two decades. We notably review theoretical works, with a particular focus on opacity, as well as more practical works, with a particular focus on attack trees and their extensions. We derive main conclusions concerning open perspectives, as well as tool support.
Timed automata are a common formalism for the verification of concurrent systems subject to timing constraints. They extend finite-state automata with clocks, that constrain the system behavior in locations, and to take transitions. While timed automata were originally designed for safety (in the wide sense of correctness w.r.t. a formal property), they were progressively used in a number of works to guarantee security properties. In this work, we review works studying security properties for timed automata over the past two decades. We notably review theoretical works, with a particular focus on opacity, as well as more practical works, with a particular focus on attack trees and their extensions. We derive main conclusions concerning open perspectives, as well as tool support.
ArticleNumber 127
Author Arcile, Johan
André, Étienne
Author_xml – sequence: 1
  givenname: Johan
  orcidid: 0000-0001-9979-3829
  surname: Arcile
  fullname: Arcile, Johan
  email: johan.arcile@univ-lorraine.fr
  organization: Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
– sequence: 2
  givenname: Étienne
  orcidid: 0000-0001-8473-9555
  surname: André
  fullname: André, Étienne
  email: Andre.Etienne@lipn13.fr
  organization: Université de Lorraine, CNRS, Inria, LORIA, Nancy, France
BackLink https://hal.science/hal-03690234$$DView record in HAL
BookMark eNpt0E1Lw0AQBuBFKthW8e5pwYN4iO5nNvFWSmuFgkKr1zBNNnZLk627m2L-vS2tPYingZmHl5npoU5ta43QNSUPlAr5yCUXaazOUJdKqSLFBe2gLuExiQgn5AL1vF8RQpigcRd9zE2lCzxogq0gAAaPAY-tq2BtfIVL6_Doe-O096b-xDOdN86E9gkP8KxxW91iW-P5UlvXYqgL_OYgDybXl-i8hLXXV8faR-_j0Xw4iaavzy_DwTQCTuIQ6YVgRaJAFkpBkchUq0WqCkE4UJLqMhE5Z1IxntCYKpUUVGnJmSAJi_WiXPA-uj_kLmGdbZypwLWZBZNNBtNs39vdnRLGxZbu7O3Bbpz9arQP2co2rt6tl7GEcSoTofbq7qByZ713ujzFUpLtH5wdH7yT0R-ZmwDB2Do4MOt__M3BQ16dQn-HP6vIgt0
CitedBy_id crossref_primary_10_4204_EPTCS_392_1
crossref_primary_10_1145_3638043
crossref_primary_10_7717_peerj_cs_2377
crossref_primary_10_3390_app122412946
Cites_doi 10.1016/j.tcs.2015.07.048
10.1109/CCNC46108.2020.9045724
10.1109/HASE.2017.12
10.1109/QEST.2011.34
10.1016/j.ijcip.2012.08.002
10.1007/978-3-540-75454-1_15
10.1145/155848.155852
10.1007/978-3-319-08867-9_49
10.1007/s10207-008-0058-x
10.1515/amcs-2015-0031
10.1145/2896386
10.1016/0196-6774(82)90004-9
10.1007/978-3-319-39426-8_13
10.1109/ISCAS.2019.8702440
10.1145/1454630.1454638
10.1109/IAS.2008.10
10.1007/978-3-642-32122-1
10.1007/BFb0025774
10.1016/j.entcs.2004.11.044
10.1016/0020-0255(85)90026-X
10.1145/77648.77649
10.1007/978-3-030-57805-3_14
10.1007/978-3-030-01461-2_3
10.1007/978-3-319-46586-9_6
10.1145/167088.167242
10.1016/j.jnca.2012.05.003
10.1109/ICECCS.2019.00015
10.4230/LIPIcs.TIME.2017.21
10.1007/s00165-012-0269-9
10.1007/978-3-642-04081-8_33
10.1007/3-540-68697-5_9
10.1007/978-3-319-63121-9_1
10.1016/S0304-3975(01)00215-8
10.1016/S0065-2458(03)58003-2
10.1016/S0304-3975(02)00334-1
10.1145/234313.234418
10.1007/978-3-319-46586-9_5
10.1145/1029133.1029137
10.1016/0020-0190(95)00144-2
10.1109/SEFM.2003.1236205
10.1016/j.cosrev.2015.03.001
10.4304/jcp.4.5.366-377
10.3233/FI-2021-2066
10.1007/978-3-319-10512-3_2
10.1007/s11225-015-9637-9
10.17512/jamcm.2015.3.14
10.1145/7351.7352
10.1007/s10703-009-0074-0
10.1007/978-3-030-45190-5_24
10.1007/s10009-002-0094-1
10.1016/j.scico.2003.12.002
10.1145/2508859.2516712
10.1016/j.cosrev.2014.07.001
10.1109/TCAD.2018.2857363
10.1145/3214292.3214294
10.1109/MWC.2007.4396947
10.1016/0304-3975(94)90010-8
10.1007/s12927-019-0003-8
10.1051/ita:2000131
10.1109/ICECCS51672.2020.00012
10.1016/S0304-3975(01)00046-9
10.1007/978-3-030-81685-8_26
10.1109/CSF.2019.00010
10.1016/j.cose.2010.09.002
10.1109/CCNC.2018.8319187
10.1145/2518102
10.1109/TII.2011.2166794
10.1016/j.cag.2005.10.004
10.1006/inco.1993.1024
10.1145/1242572.1242656
10.1145/3078809
10.1145/3023872
10.1142/S021819401840020X
10.1145/3127586
10.1109/TKDE.2005.1
10.1007/978-3-319-89960-2_4
10.1109/TSE.2014.2359893
10.1007/978-3-030-20005-3_3
10.1007/978-3-642-30793-5_6
10.1093/logcom/exs029
10.1109/TSE.2017.2712621
10.1007/978-3-319-10506-2_22
10.1007/978-3-319-89363-1_4
10.1007/978-3-030-00151-3_3
10.1007/978-3-319-74860-3_5
10.1007/978-3-540-85735-8_6
10.1007/978-3-662-49635-0_9
10.1007/978-3-540-30080-9_1
10.1007/11539452_9
10.1016/S1567-8326(02)00037-1
10.1007/978-3-030-63406-3_1
10.5220/0010388701810188
10.1109/TSE.2010.4
10.1007/978-3-319-60840-2_35
10.1007/978-3-319-89722-6_2
10.1016/S0951-8320(01)00101-6
10.1007/978-3-030-75018-3_49
10.1007/978-3-030-29662-9_14
10.1145/3331524
10.1109/FUZZY.2010.5584893
10.1007/11560326_17
10.1613/jair.1.11936
10.1007/978-3-319-99981-4_3
10.1016/S1571-0661(04)00329-9
10.1016/j.entcs.2005.05.046
10.1007/11561163_8
10.1007/978-3-030-67220-1_3
10.1109/2.485845
10.5220/0007830605700577
10.1109/TIE.2005.855692
10.1145/501978.501979
10.1109/ISSRE.2011.19
10.1145/359657.359659
10.1007/978-3-662-46681-0_16
10.3233/FI-2009-0100
10.1023/A:1016598314198
10.1109/JSAC.2004.842547
10.17487/RFC6275
10.1109/IPDPS.2006.1639422
10.1007/978-3-030-79379-1_3
10.1007/978-3-319-94496-8_3
10.1109/49.1940
10.1002/sec.1401
10.3390/s21093055
10.1007/978-3-642-54862-8_21
10.1007/978-3-319-44878-7_3
10.4236/ijcns.2010.310104
10.1007/978-3-030-57628-8_4
10.1016/j.jisa.2021.102926
10.1007/978-3-642-29072-5_6
10.1007/0-387-24098-5_2
10.1145/3399742
10.1201/b13055-12
10.1109/SSIRI-C.2010.27
10.1007/978-3-319-70972-7_13
10.1007/3-540-60246-1_158
10.1145/360933.360975
10.1007/978-3-319-46598-2_10
10.1016/S1389-1286(01)00302-4
10.1109/DSC.2017.44
10.1007/s10009-017-0467-0
10.1007/s100090050010
10.1080/00207179.2014.944356
10.1145/1592451.1592452
10.25596/jalc-2001-003
10.3233/FI-2017-1527
10.1007/978-3-642-22110-1_30
10.1109/TSE.2006.104
10.1145/65000.65002
10.1109/40.977758
10.1007/978-3-642-02617-1_3
10.1007/s100090050009
10.1145/352600.352606
10.1109/TIT.1983.1056650
10.1007/978-3-319-48989-6_31
10.1145/964001.964017
10.1007/978-3-642-19751-2_6
10.1109/NESEA.2012.6474023
10.1109/CSFW.2000.856935
10.1016/S0304-3975(01)00330-9
10.1007/978-3-319-22975-1_11
10.1007/11513988_27
10.4230/LIPIcs.FSTTCS.2013.501
10.1007/BFb0055875
10.1016/j.microrel.2006.07.072
10.1109/RTCSA.1999.811256
10.1109/LICS.1996.561342
10.1145/182110.182113
10.1145/2808783.2808787
10.1016/j.cosrev.2013.05.001
10.1016/S0304-3975(97)00173-4
10.1007/s10009-014-0361-y
10.1007/s00450-014-0257-9
10.1016/j.pmcj.2015.06.007
10.1145/234313.234418
10.1145/3331524
10.1145/2508859.2516712
10.1145/360933.360975
10.5555/1370677.1370679
10.1145/2518102
10.1145/2808783.2808787
10.1145/167088.167242
10.5555/2370741.2370744
10.1145/352600.352606
10.1145/3127586
10.1145/3078809
10.1145/3502851
10.5555/2371116.2371118
10.1145/3214292.3214294
10.5555/2367396.2367405
10.1145/2896386
10.1145/3399742
10.1145/1029133.1029137
10.5555/2367396.2367411
10.1145/7351.7352
10.1145/182110.182113
10.1145/77648.77649
10.1016/B978-044450813-3/50026-6
10.1145/1592451.1592452
10.1145/1454630.1454638
10.1145/65000.65002
10.1145/359657.359659
10.1145/1242572.1242656
10.1145/501978.501979
10.1145/155848.155852
10.17512/jamcm.2016.2.13
10.1145/964001.964017
10.1145/3023872
ContentType Journal Article
Copyright Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from
Copyright Association for Computing Machinery Jun 2023
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from
– notice: Copyright Association for Computing Machinery Jun 2023
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
1XC
VOOES
DOI 10.1145/3534967
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1557-7341
EndPage 36
ExternalDocumentID oai_HAL_hal_03690234v1
10_1145_3534967
3534967
GrantInformation_xml – fundername: ANR-NRF French-Singaporean research program ProMiS
  grantid: ANR-19-CE25-0015
GroupedDBID --Z
-DZ
-~X
.4S
.DC
23M
4.4
5GY
5VS
6J9
85S
8US
8VB
AAIKC
AAKMM
AALFJ
AAMNW
AAYFX
ABPPZ
ACGFO
ACGOD
ACM
ACNCT
ADBCU
ADL
ADMLS
ADPZR
AEBYY
AEGXH
AEMOZ
AENEX
AENSD
AFWIH
AFWXC
AGHSJ
AHQJS
AIAGR
AIKLT
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ARCSS
ASPBG
AVWKF
BDXCO
CCLIF
CS3
EBE
EBR
EBU
EDO
EMK
FEDTE
GUFHI
HGAVV
H~9
IAO
ICD
IEA
IGS
IOF
K1G
LHSKQ
N95
P1C
P2P
PQQKQ
QWB
RNS
ROL
RXW
TAE
TH9
U5U
UKR
UPT
VQA
W7O
WH7
X6Y
XH6
XSW
XZL
YXB
Z5M
ZCA
ZL0
AAYXX
AEFXT
AEJOY
AETEA
AKRVB
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
1XC
UMC
VOOES
ID FETCH-LOGICAL-a306t-eb42d87a5d77ad859e7b97d403a109ef84c3257238161778d17e53240826ebfb3
ISSN 0360-0300
IngestDate Fri May 09 12:28:33 EDT 2025
Mon Jun 30 13:19:54 EDT 2025
Thu Jul 03 08:35:07 EDT 2025
Thu Apr 24 23:00:41 EDT 2025
Fri Feb 21 01:12:16 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords survey
opacity
Timed automata
attack trees
cybersecurity
timed automata
Language English
License Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a306t-eb42d87a5d77ad859e7b97d403a109ef84c3257238161778d17e53240826ebfb3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8473-9555
0000-0001-9979-3829
OpenAccessLink https://hal.science/hal-03690234
PQID 2823158471
PQPubID 47570
PageCount 36
ParticipantIDs hal_primary_oai_HAL_hal_03690234v1
proquest_journals_2823158471
crossref_primary_10_1145_3534967
crossref_citationtrail_10_1145_3534967
acm_primary_3534967
PublicationCentury 2000
PublicationDate 2023-07-31
PublicationDateYYYYMMDD 2023-07-31
PublicationDate_xml – month: 07
  year: 2023
  text: 2023-07-31
  day: 31
PublicationDecade 2020
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: Baltimore
PublicationTitle ACM computing surveys
PublicationTitleAbbrev ACM CSUR
PublicationYear 2023
Publisher ACM
Association for Computing Machinery
Publisher_xml – name: ACM
– name: Association for Computing Machinery
References (Bib0084) 2006
(Bib0082) 2017; 10744
(Bib0138) 2003; 5
(Bib0148) 2008; 5185
(Bib0141) 2006; 30
(Bib0154) 2001; 21
(Bib0091) 2005
(Bib0140) 2009; 5710
(Bib0029) 2002; 51
(Bib0125) 2018; 44
(Bib0177) 2018; 37
(Bib0051) 2005; 3653
(Bib0083) 2015; 30
(Bib0033) 2004; 3657
(Bib0109) 2015; 9268
(Bib0088) 2002; 52–53
(Bib0043) 2009; 35
(Bib0194) 2018
(Bib0172) 2018; 10804
(Bib0038) 2013; 24
(Bib0041) 2006; 32
(Bib0167) 2005
(Bib0035) 2015; 88
(Bib0129) 1996; 17
(Bib0077) 2004
(Bib0184) 2018; 10805
(Bib0062) 1975; 18
(Bib0107) 2014; 8666
(Bib0110) 2018; 10802
(Bib0181) 2019; 52
(Bib0130) 2018; 28
(Bib0103) 2010; 6561
(Bib0056) 2007; 15
(Bib0185) 2020; 12078
(Bib0080) 2007; 4763
(Bib0144) 2002; 8
(Bib0102) 2010
(Bib0171) 2017; 90
(Bib0046) 1990; 8
(Bib0188) 2017; 152
(Bib0089) 2014
(Bib0108) 2019
(Bib0174) 1981
(Bib0059) 2015; 17
(Bib0098) 2012; 7273
(Bib0149) 2015; 15
(Bib0092) 2020; 68
(Bib0189) 2002; 75
(Bib0153) 2005; 23
(Bib0005) 2010
(Bib0123) 2011
(Bib0086) 2016; 9635
(Bib0173) 2019
(Bib0024) 2014; 8711
(Bib0099) 2012; 5
(Bib0081) 1995
(Bib0030) 2003; 54
(Bib0139) 2017; 10460
(Bib0187) 2016; 104
(Bib0018) 2021; 12759
(Bib0008) 2002; 38
(Bib0169) 2008
(Bib0135) 2011; 30
(Bib0031) 2003; 292
(Bib0163) 2015; 14
(Bib0013) 1999; 211
(Bib0150) 2016; 9
(Bib0193) 2020
(Bib0143) 2001
(Bib0048) 1996; 28
(Bib0070) 2000
(Bib0121) 1995; 969
(Bib0170) 2020
(Bib0042) 2007
(Bib0057) 2010; 3
(Bib0021) 2018; 11022
(Bib0133) 2013; 36
(Bib0050) 2009; 5576
(Bib0093) 2016; 9871
(Bib0026) 2020; 12531
(Bib0087) 2009; 42
(Bib0115) 2012
(Bib0010) 2019
(Bib0044) 2008; 7
(Bib0168) 2012
(Bib0191) 2019; 951
(Bib0076) 2018; 10953
(Bib0118) 2003
(Bib0176) 2018; 11180
(Bib0078) 2005; 3685
(Bib0147) 2016; 255
(Bib0064) 1982; 3
(Bib0097) 2017; 50
(Bib0025) 2016; 59
(Bib0145) 2019
(Bib0160) 1985; 36
(Bib0054) 2004; 50
(Bib0065) 1983; 29
(Bib0152) 1996; 29
(Bib0192) 2017; 10314
(Bib0012) 1994; 126
(Bib0002) 2018; 65
(Bib0009) 2021; 415
(Bib0113) 2007; 79
(Bib0100) 2020; 63
(Bib0132) 2005; 52
(Bib0063) 2001; 6
(Bib0096) 2007; 14
(Bib0019) 2020
(Bib0011) 1993; 104
(Bib0022) 2021; 182
(Bib0136) 1978; 21
(Bib0073) 2016; 9884
(Bib0190) 1997; 1
(Bib0003) 2016; 612
(Bib0049) 2006; 46
(Bib0023) 2021; 12740
(Bib0085) 1996
(Bib0020) 2022
(Bib0036) 2009; 4
(Bib0157) 2020; 1267
(Bib0040) 2017; 50
(Bib0037) 2001; 4
(Bib0111) 2017
(Bib0061) 2018
(Bib0071) 2014; 46
(Bib0161) 2015; 24
(Bib0182) 2019; 11750
(Bib0151) 1988; 6
(Bib0060) 2015
(Bib0165) 2019; 852
(Bib0104) 2014; 24
(Bib0079) 2006
(Bib0017) 2019; 21
(Bib0156) 2017; 10322
(Bib0164) 2016; 522
(Bib0131) 2004
Bib0001
(Bib0055) 2004
(Bib0112) 2016; 522
(Bib0095) 2008; 85
(Bib0072) 2011; 6806
(Bib0039) 2003; 58
(Bib0158) 2016; 15
(Bib0004) 2003; 290
(Bib0027) 2005; 3576
(Bib0032) 2005; 128
(Bib0155) 1989; 7
(Bib0142) 2011; 6275
(Bib0045) 2012; 5
(Bib0128) 1995; 56
(Bib0186) 1994; 28
(Bib0116) 2002; 282
(Bib0075) 2012
(Bib0127) 2020; 12524
(Bib0090) 2007; 79
(Bib0105) 2014; 13–14
(Bib0180) 2015; 41
(Bib0066) 2014; 8559
(Bib0137) 1993; 27
(Bib0014) 1993
(Bib0175) 2013; 9
(Bib0068) 2000
(Bib0122) 1997; 1
(Bib0101) 1996; 1109
(Bib0106) 2013
(Bib0159) 2019; 11
(Bib0058) 2015; 9035
(Bib0094) 2005; 17
(Bib0028) 2014; 26
(Bib0034) 1998; 1485
(Bib0069) 2001; 62
(Bib0183) 2020; 12288
(Bib0006) 2003; 300
(Bib0146) 2015; 25
(Bib0162) 2021
(Bib0126) 2011
(Bib0016) 2021; 61
(Bib0007) 2000; 34
(Bib0134) 2008
(Bib0178) 2017
(Bib0053) 2001
(Bib0067) 1999
(Bib0047) 2011; 7
(Bib0166) 2021; 21
(Bib0179) 2014; 8413
(Bib0015) 2004; 3185
(Bib0114) 2009; 93
(Bib0117) 1987; 5
(Bib0074) 2007; 180
(Bib0119) 2005; 173
(Bib0120) 2010; 36
(Bib0124) 2016; 9995
(Bib0052) 1981; 131
e_1_3_2_195_2
e_1_3_2_172_2
e_1_3_2_62_2
e_1_3_2_85_2
e_1_3_2_24_2
e_1_3_2_47_2
e_1_3_2_100_2
e_1_3_2_123_2
e_1_3_2_146_2
e_1_3_2_169_2
e_1_3_2_108_2
e_1_3_2_7_2
e_1_3_2_161_2
e_1_3_2_184_2
e_1_3_2_73_2
e_1_3_2_12_2
e_1_3_2_58_2
e_1_3_2_35_2
e_1_3_2_112_2
e_1_3_2_135_2
e_1_3_2_158_2
e_1_3_2_50_2
e_1_3_2_48_2
Jakubowska Gizela (e_1_3_2_92_2) 2005
e_1_3_2_40_2
e_1_3_2_86_2
e_1_3_2_171_2
e_1_3_2_63_2
e_1_3_2_25_2
e_1_3_2_145_2
e_1_3_2_168_2
e_1_3_2_122_2
e_1_3_2_107_2
e_1_3_2_59_2
e_1_3_2_6_2
e_1_3_2_183_2
e_1_3_2_51_2
e_1_3_2_74_2
e_1_3_2_160_2
e_1_3_2_13_2
e_1_3_2_36_2
e_1_3_2_97_2
Lowe Gavin (e_1_3_2_130_2) 1996; 17
e_1_3_2_134_2
e_1_3_2_157_2
e_1_3_2_111_2
e_1_3_2_119_2
e_1_3_2_151_2
e_1_3_2_22_2
e_1_3_2_45_2
e_1_3_2_68_2
e_1_3_2_125_2
e_1_3_2_148_2
e_1_3_2_60_2
e_1_3_2_83_2
e_1_3_2_102_2
e_1_3_2_163_2
e_1_3_2_186_2
e_1_3_2_18_2
e_1_3_2_140_2
e_1_3_2_10_2
e_1_3_2_5_2
e_1_3_2_33_2
e_1_3_2_79_2
e_1_3_2_56_2
e_1_3_2_114_2
e_1_3_2_137_2
e_1_3_2_94_2
e_1_3_2_71_2
e_1_3_2_152_2
Mazaré Laurent (e_1_3_2_132_2) 2004
e_1_3_2_150_2
e_1_3_2_173_2
e_1_3_2_84_2
e_1_3_2_23_2
e_1_3_2_69_2
e_1_3_2_46_2
e_1_3_2_124_2
e_1_3_2_147_2
e_1_3_2_61_2
e_1_3_2_101_2
e_1_3_2_185_2
e_1_3_2_109_2
e_1_3_2_19_2
Godskesen Jens Chr (e_1_3_2_80_2) 2006
e_1_3_2_162_2
e_1_3_2_11_2
e_1_3_2_34_2
e_1_3_2_57_2
e_1_3_2_95_2
e_1_3_2_4_2
e_1_3_2_113_2
e_1_3_2_159_2
e_1_3_2_136_2
e_1_3_2_72_2
e_1_3_2_174_2
Gregersen H. (e_1_3_2_82_2) 1995
e_1_3_2_28_2
e_1_3_2_191_2
e_1_3_2_20_2
e_1_3_2_43_2
Kacprzak Magdalena (e_1_3_2_96_2) 2008; 85
e_1_3_2_66_2
e_1_3_2_89_2
e_1_3_2_104_2
e_1_3_2_142_2
e_1_3_2_165_2
e_1_3_2_188_2
e_1_3_2_81_2
e_1_3_2_127_2
e_1_3_2_16_2
e_1_3_2_39_2
e_1_3_2_54_2
e_1_3_2_31_2
e_1_3_2_180_2
e_1_3_2_3_2
e_1_3_2_77_2
e_1_3_2_131_2
e_1_3_2_154_2
e_1_3_2_177_2
e_1_3_2_116_2
e_1_3_2_139_2
Zbrzezny Agnieszka M. (e_1_3_2_194_2) 2020
Vesely William E. (e_1_3_2_175_2) 1981
e_1_3_2_190_2
e_1_3_2_29_2
Hyla Tomasz (e_1_3_2_90_2) 2014
e_1_3_2_21_2
e_1_3_2_44_2
e_1_3_2_67_2
e_1_3_2_126_2
e_1_3_2_103_2
e_1_3_2_141_2
e_1_3_2_187_2
e_1_3_2_164_2
e_1_3_2_149_2
e_1_3_2_17_2
e_1_3_2_32_2
e_1_3_2_55_2
e_1_3_2_78_2
e_1_3_2_2_2
e_1_3_2_93_2
e_1_3_2_115_2
Perrig Adrian (e_1_3_2_144_2) 2001
e_1_3_2_176_2
e_1_3_2_70_2
e_1_3_2_153_2
e_1_3_2_138_2
e_1_3_2_26_2
e_1_3_2_49_2
e_1_3_2_193_2
e_1_3_2_41_2
e_1_3_2_64_2
e_1_3_2_87_2
e_1_3_2_170_2
e_1_3_2_167_2
e_1_3_2_121_2
e_1_3_2_106_2
e_1_3_2_129_2
e_1_3_2_9_2
e_1_3_2_37_2
e_1_3_2_75_2
e_1_3_2_182_2
e_1_3_2_52_2
e_1_3_2_14_2
e_1_3_2_98_2
e_1_3_2_156_2
e_1_3_2_179_2
e_1_3_2_110_2
e_1_3_2_133_2
e_1_3_2_118_2
e_1_3_2_27_2
e_1_3_2_192_2
e_1_3_2_65_2
e_1_3_2_42_2
e_1_3_2_88_2
e_1_3_2_189_2
e_1_3_2_120_2
e_1_3_2_166_2
e_1_3_2_143_2
e_1_3_2_105_2
e_1_3_2_128_2
e_1_3_2_15_2
e_1_3_2_38_2
e_1_3_2_8_2
e_1_3_2_30_2
e_1_3_2_53_2
e_1_3_2_76_2
e_1_3_2_99_2
e_1_3_2_181_2
e_1_3_2_91_2
e_1_3_2_178_2
e_1_3_2_155_2
e_1_3_2_117_2
References_xml – volume: 612
  start-page: 1
  year: 2016
  end-page: 22
  ident: Bib0003
  article-title: Parameterized verification of time-sensitive models of ad hoc network protocols
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/j.tcs.2015.07.048
– start-page: 1
  year: 2020
  end-page: 9
  ident: Bib0170
  article-title: Attack trees for security and privacy in social virtual reality learning environments
  publication-title: CCNC
  doi: 10.1109/CCNC46108.2020.9045724
– start-page: 25
  year: 2017
  end-page: 32
  ident: Bib0111
  article-title: Quantitative security and safety analysis with attack-fault trees
  publication-title: HASE
  doi: 10.1109/HASE.2017.12
– year: 2014
  ident: Bib0089
  article-title: Sensitive information protection on mobile devices using general access structures
  publication-title: ICONS
– start-page: 191
  year: 2011
  end-page: 200
  ident: Bib0123
  article-title: Model-based security metrics using ADversary view security evaluation (ADVISE)
  publication-title: QEST
  doi: 10.1109/QEST.2011.34
– volume: 5
  start-page: 118
  issue: 3–4
  year: 2012
  end-page: 126
  ident: Bib0045
  article-title: Modeling security in cyber-physical systems
  publication-title: Int. J. Crit. Infrastruct. Protect.
  doi: 10.1016/j.ijcip.2012.08.002
– volume: 4763
  start-page: 195
  year: 2007
  end-page: 210
  ident: Bib0080
  article-title: Efficient detection of zeno runs in timed automata
  publication-title: FORMATS
  doi: 10.1007/978-3-540-75454-1_15
– volume: 27
  start-page: 10
  issue: 2
  year: 1993
  end-page: 14
  ident: Bib0137
  article-title: A note on the use of timestamps as nonces
  publication-title: ACM SIGOPS Operat. Syst. Rev.
  doi: 10.1145/155848.155852
– volume: 8559
  start-page: 737
  year: 2014
  end-page: 744
  ident: Bib0066
  article-title: Yices 2.2
  publication-title: CAV
  doi: 10.1007/978-3-319-08867-9_49
– volume: 7
  start-page: 421
  issue: 6
  year: 2008
  end-page: 435
  ident: Bib0044
  article-title: Opacity generalised to transition systems
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-008-0058-x
– volume: 25
  start-page: 403
  issue: 2
  year: 2015
  end-page: 414
  ident: Bib0146
  article-title: Probability timed automata for investigating communication processes
  publication-title: Int. J. Appl. Math. Comput. Sci.
  doi: 10.1515/amcs-2015-0031
– volume: 59
  start-page: 76
  issue: 4
  year: 2016
  end-page: 84
  ident: Bib0025
  article-title: Secure multiparty computations on bitcoin
  publication-title: Commun. ACM
  doi: 10.1145/2896386
– volume: 3
  start-page: 14
  issue: 1
  year: 1982
  end-page: 30
  ident: Bib0064
  article-title: The byzantine generals strike again
  publication-title: J. Algor.
  doi: 10.1016/0196-6774(82)90004-9
– volume: 255
  start-page: 158
  year: 2016
  end-page: 168
  ident: Bib0147
  article-title: Parallel real time investigation of communication security changes based on probabilistic timed automata
  publication-title: BIS
  doi: 10.1007/978-3-319-39426-8_13
– year: 2001
  ident: Bib0143
  article-title: Efficient and secure source authentication for multicast
  publication-title: NDSS
– start-page: 1
  year: 2019
  end-page: 5
  ident: Bib0010
  article-title: Towards system level security analysis of artificial pancreas via UPPAAL-SMC
  publication-title: ISCAS
  doi: 10.1109/ISCAS.2019.8702440
– start-page: 100
  year: 2005
  end-page: 115
  ident: Bib0091
  article-title: Verifying security protocols with timestamps via translation to timed automata
  publication-title: CS&P
– start-page: 51
  year: 2008
  end-page: 58
  ident: Bib0169
  article-title: Modelling secure wireless sensor networks routing protocols with timed automata
  publication-title: PM2HW2N
  doi: 10.1145/1454630.1454638
– year: 2001
  ident: Bib0053
  publication-title: Model Checking
– start-page: 37
  year: 2008
  end-page: 40
  ident: Bib0134
  article-title: Security analysis of temporal-RBAC using timed automata
  publication-title: IAS
  doi: 10.1109/IAS.2008.10
– year: 2012
  ident: Bib0168
  publication-title: Software Testing in the Cloud—Migration and Execution
  doi: 10.1007/978-3-642-32122-1
– volume: 131
  start-page: 52
  year: 1981
  end-page: 71
  ident: Bib0052
  article-title: Design and synthesis of synchronization skeletons using branching-time temporal logic
  publication-title: Proceedings of the Workshop on Logics of Programs
  doi: 10.1007/BFb0025774
– volume: 128
  start-page: 105
  issue: 5
  year: 2005
  end-page: 119
  ident: Bib0032
  article-title: Team automata for security: A survey
  publication-title: Electr. Not. Theor. Comput. Sci.
  doi: 10.1016/j.entcs.2004.11.044
– volume: 79
  start-page: 363
  issue: 3–4
  year: 2007
  end-page: 378
  ident: Bib0090
  article-title: Modelling and checking timed authentication of security protocols
  publication-title: Fundam. Inf.
– volume: 36
  start-page: 59
  issue: 1–2
  year: 1985
  end-page: 83
  ident: Bib0160
  article-title: An introductory survey of fuzzy control
  publication-title: Inf. Sci.
  doi: 10.1016/0020-0255(85)90026-X
– volume: 8
  start-page: 18
  issue: 1
  year: 1990
  end-page: 36
  ident: Bib0046
  article-title: A logic of authentication
  publication-title: ACM Trans. Comput. Syst.
  doi: 10.1145/77648.77649
– volume: 1267
  start-page: 142
  year: 2020
  end-page: 151
  ident: Bib0157
  article-title: Probabilistic and timed analysis of security protocols
  publication-title: CISIS
  doi: 10.1007/978-3-030-57805-3_14
– volume: 11180
  start-page: 44
  year: 2018
  end-page: 60
  ident: Bib0176
  article-title: Decidability of the initial-state opacity of real-time automata
  publication-title: Symposium on Real-Time and Hybrid Systems—Essays Dedicated to Professor Chaochen Zhou on the Occasion of His 80th Birthday
  doi: 10.1007/978-3-030-01461-2_3
– volume: 15
  issue: 2
  year: 2016
  ident: Bib0158
  article-title: Using probabilistic automata for security protocols verification
  publication-title: J. Appl. Math. Comput. Mech.
– volume: 522
  start-page: 65
  year: 2016
  end-page: 75
  ident: Bib0112
  article-title: Some remarks on security protocols verification tools
  publication-title: ISAT, Part II
  doi: 10.1007/978-3-319-46586-9_6
– year: 1981
  ident: Bib0174
  publication-title: Fault Tree Handbook
– start-page: 592
  year: 1993
  end-page: 601
  ident: Bib0014
  article-title: Parametric real-time reasoning
  publication-title: STOC
  doi: 10.1145/167088.167242
– volume: 36
  start-page: 42
  issue: 1
  year: 2013
  end-page: 57
  ident: Bib0133
  article-title: A survey of intrusion detection techniques in cloud
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2012.05.003
– start-page: 71
  year: 2019
  end-page: 80
  ident: Bib0145
  article-title: Squeezing state spaces of (attack-defence) trees
  publication-title: ICECCS
  doi: 10.1109/ICECCS.2019.00015
– volume: 90
  start-page: 21:1–21:18
  year: 2017
  ident: Bib0171
  article-title: Time dependent policy-based access control
  publication-title: TIME
  doi: 10.4230/LIPIcs.TIME.2017.21
– volume: 26
  start-page: 99
  issue: 1
  year: 2014
  end-page: 123
  ident: Bib0028
  article-title: Formal verification of security protocol implementations: A survey
  publication-title: Form. Aspects Comput.
  doi: 10.1007/s00165-012-0269-9
– volume: 5710
  start-page: 496
  year: 2009
  end-page: 510
  ident: Bib0140
  article-title: Time-bounded verification
  publication-title: CONCUR
  doi: 10.1007/978-3-642-04081-8_33
– volume: 1109
  start-page: 104
  year: 1996
  end-page: 113
  ident: Bib0101
  article-title: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
  publication-title: CRYPTO
  doi: 10.1007/3-540-68697-5_9
– volume: 10460
  start-page: 3
  year: 2017
  end-page: 21
  ident: Bib0139
  article-title: Information flow for timed automata
  publication-title: Models, Algorithms, Logics and Tools
  doi: 10.1007/978-3-319-63121-9_1
– volume: 292
  start-page: 65
  issue: 1
  year: 2003
  end-page: 84
  ident: Bib0031
  article-title: On probabilistic timed automata
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/S0304-3975(01)00215-8
– volume: 58
  start-page: 117
  year: 2003
  end-page: 148
  ident: Bib0039
  article-title: Bounded model checking
  publication-title: Adv. Comput.
  doi: 10.1016/S0065-2458(03)58003-2
– volume: 300
  start-page: 411
  issue: 1-3
  year: 2003
  end-page: 475
  ident: Bib0006
  article-title: The power of reachability testing for timed automata
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/S0304-3975(02)00334-1
– volume: 28
  start-page: 263
  issue: 1
  year: 1996
  end-page: 264
  ident: Bib0048
  article-title: Type systems
  publication-title: Comput. Surv.
  doi: 10.1145/234313.234418
– volume: 522
  start-page: 53
  year: 2016
  end-page: 63
  ident: Bib0164
  article-title: Timed analysis of security protocols
  publication-title: ISAT, Part II
  doi: 10.1007/978-3-319-46586-9_5
– start-page: 23
  year: 2004
  end-page: 32
  ident: Bib0055
  article-title: Timed model checking of security protocols
  publication-title: FMSE
  doi: 10.1145/1029133.1029137
– volume: 56
  start-page: 131
  issue: 3
  year: 1995
  end-page: 133
  ident: Bib0128
  article-title: An attack on the needham-schroeder public-key authentication protocol
  publication-title: Inform. Process. Lett.
  doi: 10.1016/0020-0190(95)00144-2
– start-page: 34
  year: 2003
  end-page: 43
  ident: Bib0118
  article-title: Weak bisimulation for probabilistic timed automata and applications to security
  publication-title: SEFM
  doi: 10.1109/SEFM.2003.1236205
– volume: 15
  start-page: 29
  year: 2015
  end-page: 62
  ident: Bib0149
  article-title: Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2015.03.001
– volume: 51
  start-page: 1
  issue: 1–2
  year: 2002
  end-page: 11
  ident: Bib0029
  article-title: A notion of non-interference for timed automata
  publication-title: Fundam. Inf.
– volume: 4
  start-page: 366
  issue: 5
  year: 2009
  end-page: 377
  ident: Bib0036
  article-title: TPMC: A model checker for time-sensitive security protocols
  publication-title: J. Comput.
  doi: 10.4304/jcp.4.5.366-377
– volume: 182
  start-page: 69
  issue: 1
  year: 2021
  end-page: 94
  ident: Bib0022
  article-title: Parametric analyses of attack-fault trees
  publication-title: Fundam. Inf.
  doi: 10.3233/FI-2021-2066
– start-page: 2123
  year: 2020
  end-page: 2125
  ident: Bib0193
  article-title: VerSecTis—An agent based model checker for security protocols
  publication-title: AAMAS
– volume: 8711
  start-page: 7
  year: 2014
  end-page: 22
  ident: Bib0024
  article-title: Modeling bitcoin contracts by timed automata
  publication-title: FORMATS
  doi: 10.1007/978-3-319-10512-3_2
– volume: 104
  start-page: 641
  issue: 4
  year: 2016
  end-page: 678
  ident: Bib0187
  article-title: Checking EMTLK properties of timed interpreted systems via bounded model checking
  publication-title: Stud. Logic.
  doi: 10.1007/s11225-015-9637-9
– volume: 14
  start-page: 127
  issue: 3
  year: 2015
  end-page: 139
  ident: Bib0163
  article-title: Timed models of security protocols including delays in the network
  publication-title: J. Appl. Math. Comput. Mech.
  doi: 10.17512/jamcm.2015.3.14
– volume: 5
  start-page: 1
  issue: 1
  year: 1987
  end-page: 11
  ident: Bib0117
  article-title: A fast mutual exclusion algorithm
  publication-title: ACM Trans. Comput. Syst.
  doi: 10.1145/7351.7352
– volume: 35
  start-page: 121
  issue: 2
  year: 2009
  end-page: 151
  ident: Bib0043
  article-title: Decision problems for lower/upper bound parametric timed automata
  publication-title: Form. Methods Syst. Des.
  doi: 10.1007/s10703-009-0074-0
– volume: 12078
  start-page: 425
  year: 2020
  end-page: 443
  ident: Bib0185
  article-title: Verified certification of reachability checking for timed automata
  publication-title: TACAS, Part I
  doi: 10.1007/978-3-030-45190-5_24
– volume: 5
  start-page: 59
  issue: 1
  year: 2003
  end-page: 77
  ident: Bib0138
  article-title: Automated test generation from timed automata
  publication-title: Int. J. Softw. Tools Technol. Transf.
  doi: 10.1007/s10009-002-0094-1
– volume: 50
  start-page: 51
  issue: 1-3
  year: 2004
  end-page: 71
  ident: Bib0054
  article-title: Security properties: Two agents are sufficient
  publication-title: Sci. Comput. Program.
  doi: 10.1016/j.scico.2003.12.002
– start-page: 1055
  year: 2013
  end-page: 1062
  ident: Bib0106
  article-title: Cross-origin pixel stealing: Timing attacks using CSS filters
  publication-title: CCS
  doi: 10.1145/2508859.2516712
– volume: 13–14
  start-page: 1
  year: 2014
  end-page: 38
  ident: Bib0105
  article-title: DAG-based attack and defense modeling: Don’t miss the forest for the attack trees
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2014.07.001
– volume: 37
  start-page: 2845
  issue: 11
  year: 2018
  end-page: 2856
  ident: Bib0177
  article-title: The opacity of real-time automata
  publication-title: IEEE Trans. Comput.-Aid. Des. Integr. Circ. Syst.
  doi: 10.1109/TCAD.2018.2857363
– start-page: 2:1–2:8
  year: 2018
  ident: Bib0061
  article-title: Cache timing side-channel vulnerability checking with computation tree logic
  publication-title: ISCA
  doi: 10.1145/3214292.3214294
– volume: 14
  start-page: 85
  issue: 5
  year: 2007
  end-page: 91
  ident: Bib0096
  article-title: A survey of routing attacks in mobile ad hoc networks
  publication-title: IEEE Wireless Commun.
  doi: 10.1109/MWC.2007.4396947
– volume: 126
  start-page: 183
  issue: 2
  year: 1994
  end-page: 235
  ident: Bib0012
  article-title: A theory of timed automata
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/0304-3975(94)90010-8
– volume: 11
  start-page: 47
  issue: 1
  year: 2019
  end-page: 67
  ident: Bib0159
  article-title: A state-of-the-art survey on formal verification of the internet of things applications
  publication-title: J. Serv. Sci. Res.
  doi: 10.1007/s12927-019-0003-8
– volume: 34
  start-page: 565
  issue: 6
  year: 2000
  end-page: 584
  ident: Bib0007
  article-title: Characteristic formulae for timed automata
  publication-title: RAIRO Theor. Inf. Appl.
  doi: 10.1051/ita:2000131
– start-page: 37
  year: 2020
  end-page: 42
  ident: Bib0019
  article-title: Parametric non-interference in timed automata
  publication-title: ICECCS
  doi: 10.1109/ICECCS51672.2020.00012
– volume: 282
  start-page: 101
  issue: 1
  year: 2002
  end-page: 150
  ident: Bib0116
  article-title: Automatic verification of real-time systems with discrete probability distributions
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/S0304-3975(01)00046-9
– volume: 12759
  start-page: 1
  year: 2021
  end-page: 14
  ident: Bib0018
  article-title: IMITATOR 3: Synthesis of timing parameters beyond decidability
  publication-title: CAV
  doi: 10.1007/978-3-030-81685-8_26
– start-page: 32
  year: 2019
  end-page: 47
  ident: Bib0173
  article-title: Timing leaks and coarse-grained clocks
  publication-title: CSF
  doi: 10.1109/CSF.2019.00010
– volume: 30
  start-page: 128
  issue: 2–3
  year: 2011
  end-page: 147
  ident: Bib0135
  article-title: Security analysis of GTRBAC and its variants using model checking
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2010.09.002
– start-page: 1
  year: 2018
  end-page: 4
  ident: Bib0194
  article-title: Towards a social virtual reality learning environment in high fidelity
  publication-title: CCNC
  doi: 10.1109/CCNC.2018.8319187
– volume: 46
  start-page: 40:1–40:56
  issue: 3
  year: 2014
  ident: Bib0071
  article-title: A menagerie of timed automata
  publication-title: Comput. Surv.
  doi: 10.1145/2518102
– volume: 7
  start-page: 529
  issue: 4
  year: 2011
  end-page: 539
  ident: Bib0047
  article-title: Smart grid technologies: Communication technologies and standards
  publication-title: IEEE Trans. Industr. Inf.
  doi: 10.1109/TII.2011.2166794
– volume: 30
  start-page: 20
  issue: 1
  year: 2006
  end-page: 28
  ident: Bib0141
  article-title: Virtual reality and mixed reality for virtual learning environments
  publication-title: Comput. Graph.
  doi: 10.1016/j.cag.2005.10.004
– volume: 104
  start-page: 2
  issue: 1
  year: 1993
  end-page: 34
  ident: Bib0011
  article-title: Model-checking in dense real-time
  publication-title: Inf. Comput.
  doi: 10.1006/inco.1993.1024
– start-page: 621
  year: 2007
  end-page: 628
  ident: Bib0042
  article-title: Exposing private information by timing web applications
  publication-title: WWW
  doi: 10.1145/1242572.1242656
– volume: 50
  start-page: 42:1–42:8
  issue: 3
  year: 2017
  ident: Bib0097
  article-title: Corrections to ”a menagerie of timed automata”
  publication-title: Comput. Surv.
  doi: 10.1145/3078809
– year: 2022
  ident: Bib0020
  article-title: Guaranteeing timed opacity using parametric timed model checking
– volume: 50
  start-page: 6:1–6:39
  issue: 1
  year: 2017
  ident: Bib0040
  article-title: A survey of timing channels and countermeasures
  publication-title: Comput. Surv.
  doi: 10.1145/3023872
– volume: 28
  start-page: 1619
  issue: 11–12
  year: 2018
  end-page: 1636
  ident: Bib0130
  article-title: Modeling and verification of IEEE 802.11i security protocol in UPPAAL for internet of things
  publication-title: Int. J. Softw. Eng. Knowl. Eng.
  doi: 10.1142/S021819401840020X
– volume: 65
  start-page: 1:1–1:41
  issue: 1
  year: 2018
  ident: Bib0002
  article-title: The applied pi calculus: Mobile values, new names, and secure communication
  publication-title: J. ACM
  doi: 10.1145/3127586
– volume: 17
  start-page: 4
  issue: 1
  year: 2005
  end-page: 23
  ident: Bib0094
  article-title: A generalized temporal role-based access control model
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/TKDE.2005.1
– volume: 10805
  start-page: 61
  year: 2018
  end-page: 78
  ident: Bib0184
  article-title: Verified model checking of timed automata
  publication-title: TACAS, Part I
  doi: 10.1007/978-3-319-89960-2_4
– volume: 41
  start-page: 3
  issue: 1
  year: 2015
  end-page: 18
  ident: Bib0180
  article-title: A systematic study on explicit-state non-zenoness checking for timed automata
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.2014.2359893
– volume: 85
  start-page: 313
  issue: 1-4
  year: 2008
  end-page: 328
  ident: Bib0095
  article-title: VerICS 2007—A model checker for knowledge and real-time
  publication-title: Fundam. Inf.
– volume: 951
  start-page: 25
  year: 2019
  end-page: 35
  ident: Bib0191
  article-title: Efficient verification of security protocols time properties using SMT solvers
  publication-title: CISIS-ICEUTE
  doi: 10.1007/978-3-030-20005-3_3
– volume: 7273
  start-page: 84
  year: 2012
  end-page: 100
  ident: Bib0098
  article-title: Beyond lassos: Complete SMT-based bounded model checking for timed automata
  publication-title: FMOODS-FORTE
  doi: 10.1007/978-3-642-30793-5_6
– volume: 24
  start-page: 55
  issue: 1
  year: 2014
  end-page: 87
  ident: Bib0104
  article-title: Attack-defense trees
  publication-title: J. Logic Comput.
  doi: 10.1093/logcom/exs029
– volume: 44
  start-page: 725
  issue: 8
  year: 2018
  end-page: 746
  ident: Bib0125
  article-title: A formal specification and verification framework for timed security protocols
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.2017.2712621
– volume: 8666
  start-page: 326
  year: 2014
  end-page: 341
  ident: Bib0107
  article-title: Safety and security interactions modeling using the BDMP formalism: Case study of a pipeline
  publication-title: SAFECOMP
  doi: 10.1007/978-3-319-10506-2_22
– volume: 10802
  start-page: 56
  year: 2018
  end-page: 73
  ident: Bib0110
  article-title: Effective analysis of attack trees: A model-driven approach
  publication-title: FASE
  doi: 10.1007/978-3-319-89363-1_4
– volume: 11022
  start-page: 1
  year: 2018
  end-page: 17
  ident: Bib0021
  article-title: TCTL model checking lower/upper-bound parametric timed automata without invariants
  publication-title: FORMATS
  doi: 10.1007/978-3-030-00151-3_3
– volume: 10744
  start-page: 75
  year: 2017
  end-page: 90
  ident: Bib0082
  article-title: Quantitative evaluation of attack defense trees using stochastic timed automata
  publication-title: GraMSec
  doi: 10.1007/978-3-319-74860-3_5
– volume: 5185
  start-page: 48
  year: 2008
  end-page: 58
  ident: Bib0148
  article-title: A spatio-temporal access control model supporting delegation for pervasive computing applications
  publication-title: TrustBus’08
  doi: 10.1007/978-3-540-85735-8_6
– volume: 9635
  start-page: 163
  year: 2016
  end-page: 185
  ident: Bib0086
  article-title: The value of attack-defence diagrams
  publication-title: POST
  doi: 10.1007/978-3-662-49635-0_9
– volume: 3185
  start-page: 1
  year: 2004
  end-page: 24
  ident: Bib0015
  article-title: Decision problems for timed automata: A survey
  publication-title: SFM-RT
  doi: 10.1007/978-3-540-30080-9_1
– volume: 3653
  start-page: 66
  year: 2005
  end-page: 80
  ident: Bib0051
  article-title: Efficient on-the-fly algorithms for the analysis of timed games
  publication-title: CONCUR
  doi: 10.1007/11539452_9
– volume: 52–53
  start-page: 183
  year: 2002
  end-page: 220
  ident: Bib0088
  article-title: Linear parametric model checking of timed automata
  publication-title: J. Logic Algebr. Program.
  doi: 10.1016/S1567-8326(02)00037-1
– volume: 12531
  start-page: 3
  year: 2020
  end-page: 19
  ident: Bib0026
  article-title: Hackers vs. security: Attack-defence trees as asynchronous multi-agent systems
  publication-title: ICFEM
  doi: 10.1007/978-3-030-63406-3_1
– start-page: 181
  year: 2021
  end-page: 188
  ident: Bib0162
  article-title: Time influence on security protocol
  publication-title: ENASE
  doi: 10.5220/0010388701810188
– volume: 15
  start-page: 619
  issue: 6
  year: 2007
  end-page: 645
  ident: Bib0056
  article-title: Timed analysis of security protocols
  publication-title: J. Comput. Secur.
– volume: 36
  start-page: 719
  issue: 5
  year: 2010
  end-page: 734
  ident: Bib0120
  article-title: Time and probability-based information flow analysis
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.2010.4
– volume: 10314
  start-page: 487
  year: 2017
  end-page: 504
  ident: Bib0192
  article-title: Simple SMT-based bounded model checking for timed interpreted systems
  publication-title: IJCRS, Part II
  doi: 10.1007/978-3-319-60840-2_35
– volume: 10804
  start-page: 28
  year: 2018
  end-page: 52
  ident: Bib0172
  article-title: Secure information release in timed automata
  publication-title: POST
  doi: 10.1007/978-3-319-89722-6_2
– volume: 75
  start-page: 17
  issue: 1
  year: 2002
  end-page: 29
  ident: Bib0189
  article-title: Fuzzy assessment of FMEA for engine systems
  publication-title: Reliabil. Eng. Syst. Safety
  doi: 10.1016/S0951-8320(01)00101-6
– volume: 415
  start-page: 653
  year: 2021
  end-page: 660
  ident: Bib0009
  article-title: Simplified timed attack trees
  publication-title: RCIS
  doi: 10.1007/978-3-030-75018-3_49
– volume: 11750
  start-page: 236
  year: 2019
  end-page: 243
  ident: Bib0182
  article-title: Munta: A verified model checker for timed automata
  publication-title: FORMATS
  doi: 10.1007/978-3-030-29662-9_14
– volume: 52
  start-page: 75:1–75:36
  issue: 4
  year: 2019
  ident: Bib0181
  article-title: Beyond 2014: Formal methods for attack tree-based security modeling
  publication-title: Comput. Surv.
  doi: 10.1145/3331524
– start-page: 1
  year: 2010
  end-page: 8
  ident: Bib0005
  article-title: Exploiting timed automata-based fuzzy controllers and data mining to detect computer network intrusions
  publication-title: FUZZ-IEEE
  doi: 10.1109/FUZZY.2010.5584893
– volume: 3685
  start-page: 221
  year: 2005
  end-page: 234
  ident: Bib0078
  article-title: Generalized abstract non-interference: Abstract secure information-flow analysis for automata
  publication-title: MMM-ACNS
  doi: 10.1007/11560326_17
– volume: 68
  start-page: 817
  year: 2020
  end-page: 850
  ident: Bib0092
  article-title: Towards partial order reductions for strategic ability
  publication-title: J. Artif. Intell. Res.
  doi: 10.1613/jair.1.11936
– volume: 852
  start-page: 19
  year: 2019
  end-page: 29
  ident: Bib0165
  article-title: Network’s delays in timed analysis of security protocols
  publication-title: ISAT
  doi: 10.1007/978-3-319-99981-4_3
– volume: 62
  start-page: 229
  year: 2001
  end-page: 243
  ident: Bib0069
  article-title: Formal models of timing attacks on web privacy
  publication-title: Electr. Not. Theor. Comput. Sci.
  doi: 10.1016/S1571-0661(04)00329-9
– volume: 180
  start-page: 35
  issue: 1
  year: 2007
  end-page: 53
  ident: Bib0074
  article-title: Non-interference control synthesis for security timed automata
  publication-title: Electr. Not. Theor. Comput. Sci.
  doi: 10.1016/j.entcs.2005.05.046
– volume: 3657
  start-page: 162
  year: 2004
  end-page: 182
  ident: Bib0033
  article-title: Priced timed automata: Algorithms and applications
  publication-title: FMCO
  doi: 10.1007/11561163_8
– volume: 79
  start-page: 453
  issue: 3–4
  year: 2007
  end-page: 471
  ident: Bib0113
  article-title: Verifying security protocols modelled by networks of automata
  publication-title: Fundam. Inf.
– volume: 12524
  start-page: 30
  year: 2020
  end-page: 42
  ident: Bib0127
  article-title: Modeling attack-defense trees’ countermeasures using continuous time markov chains
  publication-title: ASYDE
  doi: 10.1007/978-3-030-67220-1_3
– volume: 29
  start-page: 38
  issue: 2
  year: 1996
  end-page: 47
  ident: Bib0152
  article-title: Role-based access control models
  publication-title: Computer
  doi: 10.1109/2.485845
– start-page: 570
  year: 2019
  end-page: 577
  ident: Bib0108
  article-title: A new model-based framework for testing security of IoT systems in smart cities using attack trees and price timed automata
  publication-title: ENASE
  doi: 10.5220/0007830605700577
– year: 2006
  ident: Bib0079
  article-title: Modelling and verification of security protocols for ad hoc networks using UPPAAL
  publication-title: NWPT
– volume: 52
  start-page: 1227
  issue: 5
  year: 2005
  end-page: 1235
  ident: Bib0132
  article-title: Scrub nurse robot system-intraoperative motion analysis of a scrub nurse and timed-automata-based model for surgery
  publication-title: IEEE Trans. Industr. Electr.
  doi: 10.1109/TIE.2005.855692
– volume: 4
  start-page: 191
  issue: 3
  year: 2001
  end-page: 233
  ident: Bib0037
  article-title: TRBAC: A temporal role-based access control model
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/501978.501979
– start-page: 190
  year: 2011
  end-page: 199
  ident: Bib0126
  article-title: PAT 3: An extensible architecture for building multi-domain model checkers
  publication-title: ISSRE
  doi: 10.1109/ISSRE.2011.19
– volume: 21
  start-page: 993
  issue: 12
  year: 1978
  end-page: 999
  ident: Bib0136
  article-title: Using encryption for authentication in large networks of computers
  publication-title: Commun. ACM
  doi: 10.1145/359657.359659
– volume: 9035
  start-page: 206
  year: 2015
  end-page: 211
  ident: Bib0058
  article-title: Uppaal stratego
  publication-title: TACAS
  doi: 10.1007/978-3-662-46681-0_16
– volume: 93
  start-page: 245
  issue: 1–3
  year: 2009
  end-page: 259
  ident: Bib0114
  article-title: Timed automata based model checking of timed security protocols
  publication-title: Fundam. Inf.
  doi: 10.3233/FI-2009-0100
– volume: 8
  start-page: 521
  issue: 5
  year: 2002
  end-page: 534
  ident: Bib0144
  article-title: SPINS: Security protocols for sensor networks
  publication-title: Wireless Netw.
  doi: 10.1023/A:1016598314198
– volume: 23
  start-page: 598
  issue: 3
  year: 2005
  end-page: 610
  ident: Bib0153
  article-title: Authenticated routing for ad hoc networks
  publication-title: IEEE J. Select. Areas Commun.
  doi: 10.1109/JSAC.2004.842547
– volume: 6275
  start-page: 1
  year: 2011
  end-page: 169
  ident: Bib0142
  article-title: Mobility support in IPv6
  publication-title: RFC
  doi: 10.17487/RFC6275
– year: 2006
  ident: Bib0084
  article-title: Timed automata based analysis of embedded system architectures
  publication-title: IPDPS
  doi: 10.1109/IPDPS.2006.1639422
– volume: 12740
  start-page: 39
  year: 2021
  end-page: 50
  ident: Bib0023
  article-title: A benchmarks library for extended timed automata
  publication-title: TAP
  doi: 10.1007/978-3-030-79379-1_3
– volume: 10953
  start-page: 27
  year: 2018
  end-page: 43
  ident: Bib0076
  article-title: Model checking the information flow security of real-time systems
  publication-title: ESSoS
  doi: 10.1007/978-3-319-94496-8_3
– volume: 6
  start-page: 685
  issue: 4
  year: 1988
  end-page: 696
  ident: Bib0151
  article-title: Telecommunications management network (TMN) architecture and interworking designs
  publication-title: IEEE J. Select. Areas Commun.
  doi: 10.1109/49.1940
– volume: 9
  start-page: 1072
  issue: 10
  year: 2016
  end-page: 1084
  ident: Bib0150
  article-title: Security analysis of network protocols through model checking: A case study on mobile IPv6
  publication-title: Secur. Commun. Netw.
  doi: 10.1002/sec.1401
– volume: 21
  start-page: 3055
  issue: 9
  year: 2021
  ident: Bib0166
  article-title: SAT and SMT-based verification of security protocols including time aspects
  publication-title: Sensors
  doi: 10.3390/s21093055
– volume: 8413
  start-page: 310
  year: 2014
  end-page: 325
  ident: Bib0179
  article-title: Are timed automata bad for a specification language? language inclusion checking for timed automata
  publication-title: TACAS
  doi: 10.1007/978-3-642-54862-8_21
– volume: 9884
  start-page: 35
  year: 2016
  end-page: 50
  ident: Bib0073
  article-title: Modelling attack-defense trees using timed automata
  publication-title: FORMATS
  doi: 10.1007/978-3-319-44878-7_3
– volume: 54
  start-page: 137
  issue: 2–3
  year: 2003
  end-page: 150
  ident: Bib0030
  article-title: A decidable notion of timed non-interference
  publication-title: Fundam. Inf.
– volume: 3
  start-page: 779
  issue: 10
  year: 2010
  end-page: 787
  ident: Bib0057
  article-title: A comparative analysis of tools for verification of security protocols
  publication-title: Int. J. Commun. Netw. Syst. Sci.
  doi: 10.4236/ijcns.2010.310104
– volume: 12288
  start-page: 58
  year: 2020
  end-page: 75
  ident: Bib0183
  article-title: Certifying emptiness of timed büchi automata
  publication-title: FORMATS
  doi: 10.1007/978-3-030-57628-8_4
– volume: 61
  start-page: 1
  year: 2021
  end-page: 13
  ident: Bib0016
  article-title: Bounded opacity for timed systems
  publication-title: J. Inf. Secur. Appl.
  doi: 10.1016/j.jisa.2021.102926
– volume: 5
  start-page: 141
  year: 2012
  end-page: 159
  ident: Bib0099
  article-title: Bounded model checking for parametric timed automata
  publication-title: Trans. Petri Nets Other Models Concurr.
  doi: 10.1007/978-3-642-29072-5_6
– volume: 173
  start-page: 13
  year: 2005
  end-page: 26
  ident: Bib0119
  article-title: Information flow analysis for probabilistic timed automata
  publication-title: FAST
  doi: 10.1007/0-387-24098-5_2
– volume: 63
  start-page: 93
  issue: 7
  year: 2020
  end-page: 101
  ident: Bib0100
  article-title: Spectre attacks: Exploiting speculative execution
  publication-title: Commun. ACM
  doi: 10.1145/3399742
– start-page: 223
  year: 2012
  end-page: 254
  ident: Bib0115
  article-title: Applying timed automata to model checking of security protocols
  publication-title: Handbook of Finite State Based Models and Applications
  doi: 10.1201/b13055-12
– start-page: 86
  year: 2010
  end-page: 93
  ident: Bib0102
  article-title: Utilization of timed automata as a verification tool for security protocols
  publication-title: SSIRI
  doi: 10.1109/SSIRI-C.2010.27
– volume: 10322
  start-page: 247
  year: 2017
  end-page: 267
  ident: Bib0156
  article-title: Fantastic timers and where to find them: High-resolution microarchitectural attacks in javascript
  publication-title: FC
  doi: 10.1007/978-3-319-70972-7_13
– volume: 969
  start-page: 529
  year: 1995
  end-page: 539
  ident: Bib0121
  article-title: From timed automata to logic—and back
  publication-title: MFCS
  doi: 10.1007/3-540-60246-1_158
– volume: 18
  start-page: 453
  issue: 8
  year: 1975
  end-page: 457
  ident: Bib0062
  article-title: Guarded commands, nondeterminacy and formal derivation of programs
  publication-title: Commun. ACM
  doi: 10.1145/360933.360975
– volume: 9871
  start-page: 138
  year: 2016
  end-page: 153
  ident: Bib0093
  article-title: A stochastic framework for quantitative analysis of attack-defense trees
  publication-title: STM
  doi: 10.1007/978-3-319-46598-2_10
– volume: 38
  start-page: 393
  issue: 4
  year: 2002
  end-page: 422
  ident: Bib0008
  article-title: Wireless sensor networks: A survey
  publication-title: Comput. Netw.
  doi: 10.1016/S1389-1286(01)00302-4
– start-page: 534
  year: 2017
  end-page: 540
  ident: Bib0178
  article-title: Formal analysis of security properties of cyber-physical system based on timed automata
  publication-title: DSC
  doi: 10.1109/DSC.2017.44
– volume: 21
  start-page: 203
  issue: 2
  year: 2019
  end-page: 219
  ident: Bib0017
  article-title: What’s decidable about parametric timed automata?
  publication-title: Int. J. Softw. Tools Technol. Transf.
  doi: 10.1007/s10009-017-0467-0
– start-page: 165
  year: 2004
  end-page: 176
  ident: Bib0131
  article-title: Using unification for opacity properties
  publication-title: WITS
– volume: 1
  start-page: 134
  issue: 1–2
  year: 1997
  end-page: 152
  ident: Bib0122
  article-title: UPPAAL in a nutshell
  publication-title: Int. J. Softw. Tools Technol. Transf.
  doi: 10.1007/s100090050010
– volume: 88
  start-page: 217
  issue: 2
  year: 2015
  end-page: 236
  ident: Bib0035
  article-title: Control and synthesis of non-interferent timed systems
  publication-title: Int. J. Contr.
  doi: 10.1080/00207179.2014.944356
– volume: 42
  start-page: 1:1–1:31
  issue: 1
  year: 2009
  ident: Bib0087
  article-title: A survey of attack and defense techniques for reputation systems
  publication-title: Comput. Surv.
  doi: 10.1145/1592451.1592452
– volume: 6
  start-page: 3
  issue: 1
  year: 2001
  end-page: 23
  ident: Bib0063
  article-title: Real-time automata
  publication-title: J. Autom. Lang. Combin.
  doi: 10.25596/jalc-2001-003
– volume: 152
  start-page: 411
  issue: 4
  year: 2017
  end-page: 433
  ident: Bib0188
  article-title: SMT-based searching for k-quasi-optimal runs in weighted timed automata
  publication-title: Fundam. Inf.
  doi: 10.3233/FI-2017-1527
– volume: 6806
  start-page: 379
  year: 2011
  end-page: 395
  ident: Bib0072
  article-title: SpaceEx: Scalable verification of hybrid systems
  publication-title: CAV
  doi: 10.1007/978-3-642-22110-1_30
– volume: 32
  start-page: 812
  issue: 10
  year: 2006
  end-page: 830
  ident: Bib0041
  article-title: MODEST: A compositional modeling formalism for hard and softly timed systems
  publication-title: IEEE Trans. Softw. Eng.
  doi: 10.1109/TSE.2006.104
– volume: 7
  start-page: 247
  issue: 3
  year: 1989
  end-page: 280
  ident: Bib0155
  article-title: Integrating security in a large distributed system
  publication-title: ACM Trans. Comput. Syst.
  doi: 10.1145/65000.65002
– volume: 21
  start-page: 50
  issue: 6
  year: 2001
  end-page: 54
  ident: Bib0154
  article-title: Radio frequency identification and the electronic product code
  publication-title: IEEE Micro
  doi: 10.1109/40.977758
– volume: 5576
  start-page: 21
  year: 2009
  end-page: 30
  ident: Bib0050
  article-title: The dark side of timed opacity
  publication-title: ISA
  doi: 10.1007/978-3-642-02617-1_3
– year: 1995
  ident: Bib0081
  publication-title: Formal Design of Reliable Real Time Systems
– volume: 1
  start-page: 123
  issue: 1-2
  year: 1997
  end-page: 133
  ident: Bib0190
  article-title: KRONOS: A verification tool for real-time systems
  publication-title: Int. J. Softw. Tools Technol. Transf.
  doi: 10.1007/s100090050009
– start-page: 25
  year: 2000
  end-page: 32
  ident: Bib0068
  article-title: Timing attacks on web privacy
  publication-title: CCS
  doi: 10.1145/352600.352606
– volume: 29
  start-page: 198
  issue: 2
  year: 1983
  end-page: 207
  ident: Bib0065
  article-title: On the security of public key protocols
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1983.1056650
– volume: 9995
  start-page: 513
  year: 2016
  end-page: 530
  ident: Bib0124
  article-title: Automated verification of timed security protocols with clock drift
  publication-title: FM
  doi: 10.1007/978-3-319-48989-6_31
– start-page: 186
  year: 2004
  end-page: 197
  ident: Bib0077
  article-title: Abstract non-interference: Parameterizing non-interference by abstract interpretation
  publication-title: POPL
  doi: 10.1145/964001.964017
– volume: 6561
  start-page: 80
  year: 2010
  end-page: 95
  ident: Bib0103
  article-title: Foundations of attack-defense trees
  publication-title: FAST
  doi: 10.1007/978-3-642-19751-2_6
– start-page: 1
  year: 2012
  end-page: 6
  ident: Bib0075
  article-title: Verification of spatio-temporal role based access control using timed automata
  publication-title: NESEA
  doi: 10.1109/NESEA.2012.6474023
– start-page: 170
  year: 2000
  end-page: 184
  ident: Bib0070
  article-title: Information flow analysis in a discrete-time process algebra
  publication-title: CSFW
  doi: 10.1109/CSFW.2000.856935
– volume: 290
  start-page: 241
  issue: 1
  year: 2003
  end-page: 264
  ident: Bib0004
  article-title: Model checking of systems with many identical timed processes
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/S0304-3975(01)00330-9
– volume: 9268
  start-page: 156
  year: 2015
  end-page: 171
  ident: Bib0109
  article-title: Quantitative attack tree analysis via priced timed automata
  publication-title: FORMATS
  doi: 10.1007/978-3-319-22975-1_11
– volume: 17
  start-page: 93
  issue: 3
  year: 1996
  end-page: 102
  ident: Bib0129
  article-title: Breaking and fixing the needham-schroeder public-key protocol using FDR
  publication-title: Softw. Concepts Tools
– volume: 3576
  start-page: 281
  year: 2005
  end-page: 285
  ident: Bib0027
  article-title: The AVISPA tool for the automated validation of internet security protocols and applications
  publication-title: CAV
  doi: 10.1007/11513988_27
– volume: 24
  start-page: 501
  year: 2013
  end-page: 513
  ident: Bib0038
  article-title: Parameterized verification of many identical probabilistic timed processes
  publication-title: FSTTCS
  doi: 10.4230/LIPIcs.FSTTCS.2013.501
– volume: 1485
  start-page: 361
  year: 1998
  end-page: 375
  ident: Bib0034
  article-title: Kerberos version 4: Inductive analysis of the secrecy goals
  publication-title: ESORICS
  doi: 10.1007/BFb0055875
– volume: 46
  start-page: 1795
  issue: 9–11
  year: 2006
  end-page: 1799
  ident: Bib0049
  article-title: Failure analysis-assisted FMEA
  publication-title: Microelectr. Reliabil.
  doi: 10.1016/j.microrel.2006.07.072
– start-page: 280
  year: 1999
  end-page: 286
  ident: Bib0067
  article-title: Scheduling a steel plant with timed automata
  publication-title: RTCSA
  doi: 10.1109/RTCSA.1999.811256
– start-page: 278
  year: 1996
  end-page: 292
  ident: Bib0085
  article-title: The theory of hybrid automata
  publication-title: LiCS
  doi: 10.1109/LICS.1996.561342
– volume: 28
  start-page: 24
  issue: 3
  year: 1994
  end-page: 37
  ident: Bib0186
  article-title: A lesson on authentication protocol design
  publication-title: ACM SIGOPS Operat. Syst. Rev.
  doi: 10.1145/182110.182113
– start-page: 21
  year: 2015
  end-page: 28
  ident: Bib0060
  article-title: Modelling social-technical attacks with timed automata
  publication-title: MIST
  doi: 10.1145/2808783.2808787
– volume: 9
  start-page: 1
  year: 2013
  end-page: 26
  ident: Bib0175
  article-title: A survey of timed automata for the development of real-time systems
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2013.05.001
– year: 2005
  ident: Bib0167
  article-title: Minisat v1.13-a SAT solver with conflict-clause minimization
– volume: 211
  start-page: 253
  issue: 1–2
  year: 1999
  end-page: 273
  ident: Bib0013
  article-title: Event-clock automata: A determinizable class of timed automata
  publication-title: Theor. Comput. Sci.
  doi: 10.1016/S0304-3975(97)00173-4
– ident: Bib0001
  article-title: Uppaal CORA
– volume: 17
  start-page: 397
  issue: 4
  year: 2015
  end-page: 415
  ident: Bib0059
  article-title: Uppaal SMC tutorial
  publication-title: Int. J. Softw. Tools Technol. Transf.
  doi: 10.1007/s10009-014-0361-y
– volume: 30
  start-page: 255
  issue: 3–4
  year: 2015
  end-page: 283
  ident: Bib0083
  article-title: Automata-based refinement checking for real-time systems
  publication-title: Comput. Sci. Res. Dev.
  doi: 10.1007/s00450-014-0257-9
– volume: 24
  start-page: 61
  year: 2015
  end-page: 76
  ident: Bib0161
  article-title: Modeling and verifying EPC network intrusion system based on timed automata
  publication-title: Perv. Mobile Comput.
  doi: 10.1016/j.pmcj.2015.06.007
– ident: e_1_3_2_85_2
  doi: 10.1109/IPDPS.2006.1639422
– ident: e_1_3_2_134_2
  doi: 10.1016/j.jnca.2012.05.003
– ident: e_1_3_2_136_2
  doi: 10.1016/j.cose.2010.09.002
– ident: e_1_3_2_7_2
  doi: 10.1016/S0304-3975(02)00334-1
– ident: e_1_3_2_49_2
  doi: 10.1145/234313.234418
– ident: e_1_3_2_178_2
  doi: 10.1109/TCAD.2018.2857363
– ident: e_1_3_2_182_2
  doi: 10.1145/3331524
– ident: e_1_3_2_180_2
  doi: 10.1007/978-3-642-54862-8_21
– ident: e_1_3_2_107_2
  doi: 10.1145/2508859.2516712
– ident: e_1_3_2_63_2
  doi: 10.1145/360933.360975
– ident: e_1_3_2_102_2
  doi: 10.1007/3-540-68697-5_9
– ident: e_1_3_2_11_2
  doi: 10.1109/ISCAS.2019.8702440
– ident: e_1_3_2_57_2
  doi: 10.5555/1370677.1370679
– ident: e_1_3_2_72_2
  doi: 10.1145/2518102
– ident: e_1_3_2_61_2
  doi: 10.1145/2808783.2808787
– ident: e_1_3_2_157_2
  doi: 10.1007/978-3-319-70972-7_13
– ident: e_1_3_2_81_2
  doi: 10.1007/978-3-540-75454-1_15
– ident: e_1_3_2_46_2
  doi: 10.1016/j.ijcip.2012.08.002
– ident: e_1_3_2_15_2
  doi: 10.1145/167088.167242
– ident: e_1_3_2_149_2
  doi: 10.1007/978-3-540-85735-8_6
– ident: e_1_3_2_39_2
  doi: 10.4230/LIPIcs.FSTTCS.2013.501
– ident: e_1_3_2_164_2
  doi: 10.17512/jamcm.2015.3.14
– ident: e_1_3_2_174_2
  doi: 10.1109/CSF.2019.00010
– ident: e_1_3_2_2_2
– ident: e_1_3_2_60_2
  doi: 10.1007/s10009-014-0361-y
– ident: e_1_3_2_148_2
  doi: 10.1007/978-3-319-39426-8_13
– ident: e_1_3_2_9_2
  doi: 10.1016/S1389-1286(01)00302-4
– ident: e_1_3_2_79_2
  doi: 10.1007/11560326_17
– ident: e_1_3_2_31_2
  doi: 10.5555/2370741.2370744
– ident: e_1_3_2_87_2
  doi: 10.1007/978-3-662-49635-0_9
– ident: e_1_3_2_45_2
  doi: 10.1007/s10207-008-0058-x
– ident: e_1_3_2_111_2
  doi: 10.1007/978-3-319-89363-1_4
– ident: e_1_3_2_75_2
  doi: 10.1016/j.entcs.2005.05.046
– ident: e_1_3_2_177_2
  doi: 10.1007/978-3-030-01461-2_3
– ident: e_1_3_2_69_2
  doi: 10.1145/352600.352606
– ident: e_1_3_2_122_2
  doi: 10.1007/3-540-60246-1_158
– ident: e_1_3_2_191_2
  doi: 10.1007/s100090050009
– ident: e_1_3_2_86_2
  doi: 10.1109/LICS.1996.561342
– ident: e_1_3_2_3_2
  doi: 10.1145/3127586
– ident: e_1_3_2_16_2
  doi: 10.1007/978-3-540-30080-9_1
– ident: e_1_3_2_5_2
  doi: 10.1016/S0304-3975(01)00330-9
– ident: e_1_3_2_116_2
  doi: 10.1201/b13055-12
– ident: e_1_3_2_58_2
  doi: 10.4236/ijcns.2010.310104
– ident: e_1_3_2_59_2
  doi: 10.1007/978-3-662-46681-0_16
– ident: e_1_3_2_76_2
  doi: 10.1109/NESEA.2012.6474023
– ident: e_1_3_2_98_2
  doi: 10.1145/3078809
– ident: e_1_3_2_119_2
  doi: 10.1109/SEFM.2003.1236205
– ident: e_1_3_2_12_2
  doi: 10.1006/inco.1993.1024
– ident: e_1_3_2_142_2
  doi: 10.1016/j.cag.2005.10.004
– ident: e_1_3_2_21_2
  doi: 10.1145/3502851
– ident: e_1_3_2_30_2
  doi: 10.5555/2371116.2371118
– ident: e_1_3_2_103_2
  doi: 10.1109/SSIRI-C.2010.27
– start-page: 2123
  volume-title: AAMAS
  year: 2020
  ident: e_1_3_2_194_2
– ident: e_1_3_2_28_2
  doi: 10.1007/11513988_27
– ident: e_1_3_2_62_2
  doi: 10.1145/3214292.3214294
– ident: e_1_3_2_17_2
  doi: 10.1016/j.jisa.2021.102926
– ident: e_1_3_2_123_2
  doi: 10.1007/s100090050010
– ident: e_1_3_2_181_2
  doi: 10.1109/TSE.2014.2359893
– ident: e_1_3_2_74_2
  doi: 10.1007/978-3-319-44878-7_3
– ident: e_1_3_2_166_2
  doi: 10.1007/978-3-319-99981-4_3
– ident: e_1_3_2_64_2
  doi: 10.25596/jalc-2001-003
– ident: e_1_3_2_91_2
  doi: 10.5555/2367396.2367405
– ident: e_1_3_2_131_2
  doi: 10.1142/S021819401840020X
– ident: e_1_3_2_160_2
  doi: 10.1007/s12927-019-0003-8
– ident: e_1_3_2_26_2
  doi: 10.1145/2896386
– ident: e_1_3_2_101_2
  doi: 10.1145/3399742
– ident: e_1_3_2_68_2
  doi: 10.1109/RTCSA.1999.811256
– ident: e_1_3_2_53_2
  doi: 10.1007/BFb0025774
– ident: e_1_3_2_165_2
  doi: 10.1007/978-3-319-46586-9_5
– volume: 85
  start-page: 313
  issue: 1
  year: 2008
  ident: e_1_3_2_96_2
  article-title: VerICS 2007—A model checker for knowledge and real-time
  publication-title: Fundam. Inf.
– ident: e_1_3_2_20_2
  doi: 10.1109/ICECCS51672.2020.00012
– ident: e_1_3_2_84_2
  doi: 10.1007/s00450-014-0257-9
– ident: e_1_3_2_42_2
  doi: 10.1109/TSE.2006.104
– ident: e_1_3_2_48_2
  doi: 10.1109/TII.2011.2166794
– ident: e_1_3_2_65_2
  doi: 10.1016/0196-6774(82)90004-9
– ident: e_1_3_2_120_2
  doi: 10.1007/0-387-24098-5_2
– ident: e_1_3_2_105_2
  doi: 10.1093/logcom/exs029
– ident: e_1_3_2_71_2
  doi: 10.1109/CSFW.2000.856935
– start-page: 100
  volume-title: CS&P
  year: 2005
  ident: e_1_3_2_92_2
– ident: e_1_3_2_56_2
  doi: 10.1145/1029133.1029137
– ident: e_1_3_2_89_2
  doi: 10.1016/S1567-8326(02)00037-1
– ident: e_1_3_2_6_2
  doi: 10.1109/FUZZY.2010.5584893
– ident: e_1_3_2_66_2
  doi: 10.1109/TIT.1983.1056650
– ident: e_1_3_2_190_2
  doi: 10.1016/S0951-8320(01)00101-6
– ident: e_1_3_2_114_2
  doi: 10.5555/2367396.2367411
– ident: e_1_3_2_14_2
  doi: 10.1016/S0304-3975(97)00173-4
– ident: e_1_3_2_135_2
  doi: 10.1109/IAS.2008.10
– ident: e_1_3_2_128_2
  doi: 10.1007/978-3-030-67220-1_3
– ident: e_1_3_2_24_2
  doi: 10.1007/978-3-030-79379-1_3
– ident: e_1_3_2_179_2
  doi: 10.1109/DSC.2017.44
– ident: e_1_3_2_113_2
  doi: 10.1007/978-3-319-46586-9_6
– ident: e_1_3_2_171_2
  doi: 10.1109/CCNC46108.2020.9045724
– ident: e_1_3_2_4_2
  doi: 10.1016/j.tcs.2015.07.048
– ident: e_1_3_2_37_2
  doi: 10.4304/jcp.4.5.366-377
– ident: e_1_3_2_18_2
  doi: 10.1007/s10009-017-0467-0
– ident: e_1_3_2_99_2
  doi: 10.1007/978-3-642-30793-5_6
– ident: e_1_3_2_50_2
  doi: 10.1016/j.microrel.2006.07.072
– volume-title: NDSS
  year: 2001
  ident: e_1_3_2_144_2
– ident: e_1_3_2_143_2
  doi: 10.17487/RFC6275
– ident: e_1_3_2_40_2
  doi: 10.1016/S0065-2458(03)58003-2
– ident: e_1_3_2_169_2
  doi: 10.1007/978-3-642-32122-1
– ident: e_1_3_2_118_2
  doi: 10.1145/7351.7352
– ident: e_1_3_2_187_2
  doi: 10.1145/182110.182113
– ident: e_1_3_2_172_2
  doi: 10.4230/LIPIcs.TIME.2017.21
– ident: e_1_3_2_112_2
  doi: 10.1109/HASE.2017.12
– ident: e_1_3_2_35_2
  doi: 10.1007/BFb0055875
– ident: e_1_3_2_129_2
  doi: 10.1016/0020-0190(95)00144-2
– ident: e_1_3_2_25_2
  doi: 10.1007/978-3-319-10512-3_2
– ident: e_1_3_2_47_2
  doi: 10.1145/77648.77649
– ident: e_1_3_2_188_2
  doi: 10.1007/s11225-015-9637-9
– ident: e_1_3_2_32_2
  doi: 10.1016/S0304-3975(01)00215-8
– ident: e_1_3_2_22_2
  doi: 10.1007/978-3-030-00151-3_3
– ident: e_1_3_2_133_2
  doi: 10.1109/TIE.2005.855692
– ident: e_1_3_2_153_2
  doi: 10.1109/2.485845
– ident: e_1_3_2_29_2
  doi: 10.1007/s00165-012-0269-9
– ident: e_1_3_2_154_2
  doi: 10.1109/JSAC.2004.842547
– ident: e_1_3_2_54_2
  doi: 10.1016/B978-044450813-3/50026-6
– ident: e_1_3_2_67_2
  doi: 10.1007/978-3-319-08867-9_49
– ident: e_1_3_2_108_2
  doi: 10.1007/978-3-319-10506-2_22
– ident: e_1_3_2_146_2
  doi: 10.1109/ICECCS.2019.00015
– ident: e_1_3_2_13_2
  doi: 10.1016/0304-3975(94)90010-8
– ident: e_1_3_2_185_2
  doi: 10.1007/978-3-319-89960-2_4
– ident: e_1_3_2_155_2
  doi: 10.1109/40.977758
– ident: e_1_3_2_94_2
  doi: 10.1007/978-3-319-46598-2_10
– ident: e_1_3_2_97_2
  doi: 10.1109/MWC.2007.4396947
– ident: e_1_3_2_163_2
  doi: 10.5220/0010388701810188
– ident: e_1_3_2_95_2
  doi: 10.1109/TKDE.2005.1
– ident: e_1_3_2_140_2
  doi: 10.1007/978-3-319-63121-9_1
– ident: e_1_3_2_192_2
  doi: 10.1007/978-3-030-20005-3_3
– ident: e_1_3_2_77_2
  doi: 10.1007/978-3-319-94496-8_3
– ident: e_1_3_2_186_2
  doi: 10.1007/978-3-030-45190-5_24
– ident: e_1_3_2_126_2
  doi: 10.1109/TSE.2017.2712621
– ident: e_1_3_2_10_2
  doi: 10.1007/978-3-030-75018-3_49
– ident: e_1_3_2_51_2
  doi: 10.1007/978-3-642-02617-1_3
– ident: e_1_3_2_168_2
– ident: e_1_3_2_55_2
  doi: 10.1016/j.scico.2003.12.002
– ident: e_1_3_2_88_2
  doi: 10.1145/1592451.1592452
– ident: e_1_3_2_183_2
  doi: 10.1007/978-3-030-29662-9_14
– volume-title: Fault Tree Handbook
  year: 1981
  ident: e_1_3_2_175_2
– ident: e_1_3_2_110_2
  doi: 10.1007/978-3-319-22975-1_11
– ident: e_1_3_2_176_2
  doi: 10.1016/j.cosrev.2013.05.001
– ident: e_1_3_2_23_2
  doi: 10.3233/FI-2021-2066
– ident: e_1_3_2_19_2
  doi: 10.1007/978-3-030-81685-8_26
– ident: e_1_3_2_150_2
  doi: 10.1016/j.cosrev.2015.03.001
– ident: e_1_3_2_121_2
  doi: 10.1109/TSE.2010.4
– ident: e_1_3_2_100_2
  doi: 10.1007/978-3-642-29072-5_6
– ident: e_1_3_2_162_2
  doi: 10.1016/j.pmcj.2015.06.007
– ident: e_1_3_2_170_2
  doi: 10.1145/1454630.1454638
– ident: e_1_3_2_83_2
  doi: 10.1007/978-3-319-74860-3_5
– ident: e_1_3_2_152_2
  doi: 10.1109/49.1940
– volume: 17
  start-page: 93
  issue: 3
  year: 1996
  ident: e_1_3_2_130_2
  article-title: Breaking and fixing the needham-schroeder public-key protocol using FDR
  publication-title: Softw. Concepts Tools
– ident: e_1_3_2_156_2
  doi: 10.1145/65000.65002
– ident: e_1_3_2_52_2
  doi: 10.1007/11539452_9
– ident: e_1_3_2_33_2
  doi: 10.1016/j.entcs.2004.11.044
– ident: e_1_3_2_124_2
  doi: 10.1109/QEST.2011.34
– ident: e_1_3_2_137_2
  doi: 10.1145/359657.359659
– ident: e_1_3_2_104_2
  doi: 10.1007/978-3-642-19751-2_6
– ident: e_1_3_2_43_2
  doi: 10.1145/1242572.1242656
– ident: e_1_3_2_151_2
  doi: 10.1002/sec.1401
– ident: e_1_3_2_109_2
  doi: 10.5220/0007830605700577
– ident: e_1_3_2_38_2
  doi: 10.1145/501978.501979
– ident: e_1_3_2_8_2
  doi: 10.1051/ita:2000131
– ident: e_1_3_2_44_2
  doi: 10.1007/s10703-009-0074-0
– ident: e_1_3_2_189_2
  doi: 10.3233/FI-2017-1527
– ident: e_1_3_2_141_2
  doi: 10.1007/978-3-642-04081-8_33
– ident: e_1_3_2_161_2
  doi: 10.1016/0020-0255(85)90026-X
– ident: e_1_3_2_117_2
  doi: 10.1016/S0304-3975(01)00046-9
– ident: e_1_3_2_138_2
  doi: 10.1145/155848.155852
– ident: e_1_3_2_34_2
  doi: 10.1007/11561163_8
– ident: e_1_3_2_73_2
  doi: 10.1007/978-3-642-22110-1_30
– ident: e_1_3_2_145_2
  doi: 10.1023/A:1016598314198
– ident: e_1_3_2_158_2
  doi: 10.1007/978-3-030-57805-3_14
– ident: e_1_3_2_173_2
  doi: 10.1007/978-3-319-89722-6_2
– volume-title: NWPT
  year: 2006
  ident: e_1_3_2_80_2
– ident: e_1_3_2_106_2
  doi: 10.1016/j.cosrev.2014.07.001
– volume-title: Formal Design of Reliable Real Time Systems
  year: 1995
  ident: e_1_3_2_82_2
– ident: e_1_3_2_36_2
  doi: 10.1080/00207179.2014.944356
– ident: e_1_3_2_159_2
  doi: 10.17512/jamcm.2016.2.13
– start-page: 165
  volume-title: WITS
  year: 2004
  ident: e_1_3_2_132_2
– volume-title: ICONS
  year: 2014
  ident: e_1_3_2_90_2
– ident: e_1_3_2_78_2
  doi: 10.1145/964001.964017
– ident: e_1_3_2_93_2
  doi: 10.1613/jair.1.11936
– ident: e_1_3_2_70_2
  doi: 10.1016/S1571-0661(04)00329-9
– ident: e_1_3_2_127_2
  doi: 10.1109/ISSRE.2011.19
– ident: e_1_3_2_184_2
  doi: 10.1007/978-3-030-57628-8_4
– ident: e_1_3_2_41_2
  doi: 10.1145/3023872
– ident: e_1_3_2_125_2
  doi: 10.1007/978-3-319-48989-6_31
– ident: e_1_3_2_167_2
  doi: 10.3390/s21093055
– ident: e_1_3_2_195_2
  doi: 10.1109/CCNC.2018.8319187
– ident: e_1_3_2_193_2
  doi: 10.1007/978-3-319-60840-2_35
– ident: e_1_3_2_139_2
  doi: 10.1007/s10009-002-0094-1
– ident: e_1_3_2_27_2
  doi: 10.1007/978-3-030-63406-3_1
– ident: e_1_3_2_147_2
  doi: 10.1515/amcs-2015-0031
– ident: e_1_3_2_115_2
  doi: 10.3233/FI-2009-0100
SSID ssj0002416
Score 2.4901154
Snippet Timed automata are a common formalism for the verification of concurrent systems subject to timing constraints. They extend finite-state automata with clocks,...
SourceID hal
proquest
crossref
acm
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms attack trees
Automata theory
Clocks
Computer Science
Cryptography and Security
cybersecurity
Formal security models
Formalism
Logic and verification
Logic in Computer Science
opacity
Security
Security and privacy
survey
Theory of computation
Timed and hybrid models
timed automata
Verification by model checking
SubjectTermsDisplay Security and privacy -- Formal security models
Security and privacy -- Logic and verification
Theory of computation -- Timed and hybrid models
Theory of computation -- Verification by model checking
Title Timed Automata as a Formalism for Expressing Security: A Survey on Theory and Practice
URI https://dl.acm.org/doi/10.1145/3534967
https://www.proquest.com/docview/2823158471
https://hal.science/hal-03690234
Volume 55
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT9swFLcKXLjsgzGtwCZrmnZBYU1i185uEQNViO7Ch7hFjuMIpNIimqCJv37vxXYSyqSNXaLIiZ02v1_ee7bfByFfVKFVHo51UGr43NiokIEslA4USD7OtYEZCMY7T3-OJxfs5IpfDQYnPa-lusoP9OMf40r-B1VoA1wxSvYFyLaDQgOcA75wBITh-G8Y34Au20_ragF2p8KSMWr_GI3QGZa-QAfCo1_W0RXTbrtKdTYW_ay-fwBxANjb6HwXNWBDpvoWa3o4bfzO68Y_etl0W3Y00Tcztwp_3fEMvSTtDjxewjOZVI1nWX-RIYr96mXZBVeNApAHdgvFOFnJRSBim7fKC1Obc9eRpi8Zw56KtSlPngtvhnkuYo457EWnn_ye_Iraap0JbWg1z1zHNbIRwZQBhPRG-mN6etbqZbBV3M61_Ss2hBq7fnNd0ULRt08slLVr9I9dUdON7XH-hrxykwaaWga8JQMz3yKvfUEO6uTzO3LZEIJ6QlC1pIq2hKBACNoRgnpCfKcptXSgizm1dKBAB-rpsE0ujo_ODyeBK5wRKJgBVoHJWVRIoXghhCokT4zIE1GwUazCUWJKyXQMohqtNTBghSxCYThmZoS5psnLPH5P1ueLufmAIf0wpFSxBMOfMV4moYkwKSEb6zwyPBySLXhl2Z1NjeIxGJKv_hVm2uWax5Ins2wFrCGh7Y1-jGe3fAYM2quYDn2SnmbYBlAmQFb2AD9jz0OUuQ90mUW4xY1uAOHO3x-zSzY74u-R9eq-Nh_B3qzyT45IvwFmGHoD
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Timed+Automata+as+a+Formalism+for+Expressing+Security%3A+A+Survey+on+Theory+and+Practice&rft.jtitle=ACM+computing+surveys&rft.au=Arcile%2C+Johan&rft.au=Andr%C3%A9%2C+%C3%89tienne&rft.date=2023-07-31&rft.issn=0360-0300&rft.eissn=1557-7341&rft.volume=55&rft.issue=6&rft.spage=1&rft.epage=36&rft_id=info:doi/10.1145%2F3534967&rft.externalDBID=n%2Fa&rft.externalDocID=10_1145_3534967
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0360-0300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0360-0300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0360-0300&client=summon