Sciweavers

974 search results - page 21 / 195
» Formal Modeling of Communication Traces
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Measuring Voter-Controlled Privacy
—In voting, the notion of receipt-freeness has been proposed to express that a voter cannot gain any information to prove that she has voted in a certain way. It aims to prevent ...
Hugo L. Jonker, Sjouke Mauw, Jun Pang
ESORICS
2000
Springer
13 years 11 months ago
Verification of a Formal Security Model for Multiapplicative Smart Cards
Abstract. We present a generic formal security model for operating systems of multiapplicative smart cards. The model formalizes the main security aspects of secrecy, integrity, se...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
RSP
1999
IEEE
13 years 11 months ago
System Design Validation Using Formal Models
Formal methods are a nice idea, but the size and complexity of real systems means that they are impractical. We propose that a reasonable alternative to attempting to specify and ...
Peter Henderson, Robert John Walters
FM
1999
Springer
161views Formal Methods» more  FM 1999»
13 years 11 months ago
Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multi-robot Coordination
Abstract. The design of controllers for hybridsystemsi.e. mixeddiscretecontinuous systems in a systematic manner remains a challenging task. In this case study, we apply formal m...
Rajeev Alur, Joel M. Esposito, M. Kim, Vijay Kumar...
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
13 years 11 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim