Sciweavers

5255 search results - page 16 / 1051
» Formal Methods for Privacy
Sort
View
DSVIS
1998
Springer
13 years 12 months ago
Pragmatic Formal Design: A Case Study in Integrating Formal Methods into the HCI Development Cycle
Formal modelling, in interactive system design, has received considerably less real use than might have been hoped. Heavy weight formal methods can be expensive to use, with poor c...
Meurig Sage, Chris Johnson
AMAST
1997
Springer
13 years 11 months ago
Case Studies in Using a Meta-Method for Formal Method Integration
Abstract. We summarize the results of several experiments in applying a metamethod for formal method integration [18, 19]. We provide a small example of using an instance of integr...
Richard F. Paige
ESMART
2001
Springer
14 years 5 days ago
An Operational Semantics of the Java Card Firewall
This paper presents an operational semantics for a subset of Java Card bytecode, focussing on aspects of the Java Card firewall, method invocation, field access, variable access,...
Marc Éluard, Thomas P. Jensen, Ewen Denney
CANS
2005
Springer
105views Cryptology» more  CANS 2005»
14 years 1 months ago
A Novel Method to Maintain Privacy in Mobile Agent Applications
Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
Kun Peng, Ed Dawson, Juanma González Nieto,...
FORTE
2009
13 years 5 months ago
Epistemic Logic for the Applied Pi Calculus
We propose an epistemic logic for the applied pi calculus, which is a variant of the pi calculus with extensions for modeling cryptographic protocols. In such a calculus, the secur...
Rohit Chadha, Stéphanie Delaune, Steve Krem...