Sciweavers

5255 search results - page 72 / 1051
» Formal Methods for Privacy
Sort
View
SAFECOMP
2007
Springer
14 years 4 months ago
Modeling and Automatic Failure Analysis of Safety-Critical Systems Using Extended Safecharts
With the rapid progress in science and technology, we find ubiquitous use of safety-critical systems in avionics, consumer electronics, and medical instruments. In such systems, u...
Yean-Ru Chen, Pao-Ann Hsiung, Sao-Jie Chen
ICIW
2007
IEEE
14 years 4 months ago
Web Service Composition Approaches: From Industrial Standards to Formal Methods
Abstract— Composition of web services is much studied to support business-to-business and enterprise application integration in e-Commerce. Current web service composition approa...
Maurice H. ter Beek, Antonio Bucchiarone, Stefania...
KBSE
1997
IEEE
14 years 2 months ago
Application of Formal Methods to the Development of a Software Maintenance Tool
Partial evaluation is an optimization technique traditionally used in compilation. We have adapted this technique to the understanding of scientic application programs during t...
Sandrine Blazy, Philippe Facon
FLAIRS
2000
13 years 11 months ago
The Use of Formal Methods for Trusted Digital Signature Devices
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information ...
Bruno Langenstein, Roland Vogt, Markus Ullmann
DSVIS
2005
Springer
14 years 3 months ago
Concept Analysis as a Formal Method for Menu Design
The design and construction of navigation menus for websites have traditionally been performed manually according to the intuition of a web developer. This paper introduces a new a...
Guo-Qiang Zhang, Gongqin Shen, Ye Tian, Jiayang Su...