Sciweavers

261 search results - page 26 / 53
» A New Unfolding Approach to LTL Model Checking
Sort
View
ESORICS
2000
Springer
13 years 11 months ago
Checking Secure Interactions of Smart Card Applets
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...
JCS
2002
132views more  JCS 2002»
13 years 7 months ago
Checking Secure Interactions of Smart Card Applets: Extended Version
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...
ICDT
2009
ACM
121views Database» more  ICDT 2009»
13 years 5 months ago
Automatic verification of database-driven systems: a new frontier
We describe a novel approach to verification of software systems centered around an underlying database. Instead of applying general-purpose techniques with only partial guarantee...
Victor Vianu
PTS
2007
81views Hardware» more  PTS 2007»
13 years 9 months ago
An EFSM-Based Passive Fault Detection Approach
Extended Finite State Machine (EFSM)-based passive fault detection involves modeling the system under test (SUT) as an EFSM M, monitoring the input/output behaviors of the SUT, and...
Hasan Ural, Zhi Xu
JCS
2002
94views more  JCS 2002»
13 years 7 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar