Sciweavers

293 search results - page 19 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
ICCAD
1999
IEEE
84views Hardware» more  ICCAD 1999»
13 years 12 months ago
Improving coverage analysis and test generation for large designs
State space techniques have proven to be useful for measuring and improving the coverage of test vectors that are used during functional validation via simulation. By comparing th...
Jules P. Bergmann, Mark Horowitz
SIGSOFT
2010
ACM
13 years 5 months ago
Realizability analysis for message-based interactions using shared-state projections
The global interaction behavior in message-based systems can be specified as a finite-state machine defining acceptable sequences of messages exchanged by a group of peers. Realiz...
Sylvain Hallé, Tevfik Bultan
SOFSEM
2009
Springer
14 years 4 months ago
A Formal Model of Business Application Integration from Web Services (Position Paper)
Abstract. Currently there are many service providers on the Web. Industry recognizes that from Web services many different business applications can be quickly created. A Web servi...
Kaiyu Wan, Mubarak Mohammad, Vasu S. Alagar
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
13 years 9 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
JUCS
2008
172views more  JUCS 2008»
13 years 7 months ago
Formal Action Semantics for a UML Action Language
Abstract: The abstract syntax and static semantics of UML, the widely-used generalpurpose graphical modeling language, have been standardized in a four-layer metamodeling framework...
Mikai Yang, Greg J. Michaelson, Rob Pooley