Sciweavers

39 search results - page 6 / 8
» Formal Analysis of Key Integrity in PKCS
Sort
View
ISOLA
2010
Springer
13 years 5 months ago
Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset
Abstract. The complexity of today's embedded systems and their development trajectories requires a systematic, model-driven design approach, supported by tooling wherever poss...
Twan Basten, Emiel van Benthum, Marc Geilen, Marti...
TCBB
2008
137views more  TCBB 2008»
13 years 7 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
KES
2006
Springer
13 years 7 months ago
Solving power and trust conflicts through argumentation in agent-mediated knowledge distribution
Distributing pieces of knowledge in large, usually distributed organizations is a central problem in Knowledge and Organization management. Policies for distributing knowledge and...
Carlos Iván Chesñevar, Ramón ...
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
14 years 1 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
JAR
2000
145views more  JAR 2000»
13 years 7 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro