Sciweavers

5255 search results - page 18 / 1051
» Formal Methods for Privacy
Sort
View
FMCAD
2009
Springer
14 years 2 months ago
Verification of recursive methods on tree-like data structures
Jyotirmoy V. Deshmukh, E. Allen Emerson
FM
2008
Springer
157views Formal Methods» more  FM 2008»
13 years 9 months ago
Checking Well-Formedness of Pure-Method Specifications
Arsenii Rudich, Ádám Darvas, Peter M...
SP
1996
IEEE
116views Security Privacy» more  SP 1996»
13 years 11 months ago
Defining Noninterference in the Temporal Logic of Actions
Covert channels are a critical concern for multilevel secure (MLS) systems. Due to their subtlety, it is desirable to use formal methods to analyze MLS systems for the presence of...
Todd Fine
ISSE
2010
13 years 6 months ago
URDAD as a semi-formal approach to analysis and design
The Use Case, Responsibility Driven Analysis and Design (URDAD) methodology is a methodology for technology neutral design generating the Platform Independent Model of the Object M...
Fritz Solms, Dawid Loubser
TKDE
2012
215views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Outsourced Similarity Search on Metric Data Assets
—This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users,...
Man Lung Yiu, Ira Assent, Christian S. Jensen, Pan...