We discuss the tensions between intensionality and extensionality of spatial observations in distributed systems, showing that there are natural models where extensional observati...
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
The success of UML and more generally, of the model driven approach, has led to a proliferation of models, representing various systems, but the description of large applications ...
The research reported upon in this paper aims at reducing errors in both the requirements engineering and the system specification phase of software development, by means of system...