Sciweavers

5255 search results - page 8 / 1051
» Formal Methods for Privacy
Sort
View
SPW
2000
Springer
13 years 11 months ago
Making Sense of Specifications: The Formalization of SET
Giampaolo Bella, Fabio Massacci, Lawrence C. Pauls...
CRISIS
2008
13 years 9 months ago
Formal procedural security modeling and analysis
We are involved in a project related to the evaluation
Komminist Weldemariam, Adolfo Villafiorita
DIM
2007
ACM
13 years 11 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
CCS
2004
ACM
14 years 1 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
SAFECOMP
2010
Springer
13 years 5 months ago
Experiences in Applying Formal Verification in Robotics
Formal verification efforts in the area of robotics are still comparatively scarce. In this paper we report on our experiences with one such effort, which was concerned with design...
Dennis Walter, Holger Täubig, Christoph L&uum...