Sciweavers

300 search results - page 45 / 60
» Formal Methods for Smartcard Security
Sort
View
135
Voted
ACSAC
2002
IEEE
15 years 7 months ago
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network
The Solar Trust Model provides a method by which the sender of a message can be authenticated, and the level of trust that can be placed in the sender of the message or the messag...
Michael Clifford
AGENTS
2001
Springer
15 years 6 months ago
Collaborative multiagent learning for classification tasks
Multiagent learning di ers from standard machine learning in that most existing learning methods assume that all knowledge is available locally in a single agent. In multiagent sy...
Pragnesh Jay Modi, Wei-Min Shen
SACMAT
2010
ACM
15 years 3 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
TLDI
2003
ACM
15 years 8 months ago
The logical approach to stack typing
We develop a logic for reasoning about adjacency and separation of memory blocks, as well as aliasing of pointers. We provide a memory model for our logic and present a sound set ...
Amal J. Ahmed, David Walker
FAC
2007
128views more  FAC 2007»
15 years 2 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...