Sciweavers

41 search results - page 5 / 9
» Behavioural Subtyping and Property Preservation
Sort
View
CSFW
2004
IEEE
14 years 4 days ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
ACSD
2003
IEEE
115views Hardware» more  ACSD 2003»
14 years 1 months ago
Component-Based Design: Towards Guided Composition
In this paper, we present a mathematical model for the composition of software components, at a semantic modelling level. We describe a mathematical concept of a single software c...
Sotiris Moschoyiannis, Michael W. Shields
ICIW
2007
IEEE
14 years 2 months ago
Towards a Framework for Dynamic Verification of Peer-to-Peer Systems
Ensuring dependability and security of Peer-toPeer (P2P) systems is an intricate task due to the autonomous and volatile nature of peers and the decentralization that characterize...
Theofrastos Koulouris, George Spanoudakis, Theocha...
CSL
2007
Springer
14 years 2 months ago
The Theory of Calculi with Explicit Substitutions Revisited
Calculi with explicit substitutions (ES) are widely used in different areas of computer science. Complex systems with ES were developed these last 15 years to capture the good comp...
Delia Kesner
LICS
2008
IEEE
14 years 2 months ago
An Algebraic Process Calculus
We present an extension of the πI-calculus with formal sums of terms. The study of the properties of this sum reveals that its neutral element can be used to make assumptions abo...
Emmanuel Beffara