Sciweavers

418 search results - page 48 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
TMM
2010
241views Management» more  TMM 2010»
13 years 2 months ago
Mining Compositional Features From GPS and Visual Cues for Event Recognition in Photo Collections
As digital cameras with Global Positioning System (GPS) capability become available and people geotag their photos using other means, it is of great interest to annotate semantic e...
Junsong Yuan, Jiebo Luo, Ying Wu
JAR
2008
70views more  JAR 2008»
13 years 7 months ago
Assumption-Commitment Support for CSP Model Checking
We present a simple formulation of Assumption-Commitment reasoning using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form COM SYS A...
Nick Moffat, Michael Goldsmith
IEEEHPCS
2010
13 years 6 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
CSFW
2007
IEEE
13 years 11 months ago
Secure information flow and program logics
We present interpretations of type systems for secure information flow in Hoare logic, complementing previous encodings in binary (e.g. relational) program logics. Treating base-l...
Lennart Beringer, Martin Hofmann
WETICE
2000
IEEE
13 years 12 months ago
Reducing Software Security Risk through an Integrated Approach
This paper presents joint work by the California Institute of Technology’s Jet Propulsion Laboratory and the University of California at Davis (UC Davis) sponsored by the Nation...
David P. Gilliam, John C. Kelly, Matt Bishop