Sciweavers

293 search results - page 29 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
145
Voted
ISSTA
2004
ACM
15 years 10 months ago
Automating commutativity analysis at the design level
Two operations commute if executing them serially in either order results in the same change of state. In a system in which commands may be issued simultaneously by different use...
Greg Dennis, Robert Seater, Derek Rayside, Daniel ...
141
Voted
COMPSAC
2005
IEEE
15 years 11 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
WSC
2004
15 years 6 months ago
Fast Model-Based Penetration Testing
Traditional approaches to security evaluation have been based on penetration testing of real systems, or analysis of formal models of such systems. The former suffer from the prob...
Sankalp Singh, James Lyons, David M. Nicol
237
Voted
FIW
2009
166views Communications» more  FIW 2009»
15 years 3 months ago
Feature Interactions in a Software Product Line for E-voting
A significant number of failures in e-voting systems have arisen because of poorly specified requirements, combined with an ad-hoc approach to engineering multiple variations of si...
J. Paul Gibson, Eric Lallet, Jean-Luc Raffy
153
Voted
GI
2010
Springer
15 years 3 months ago
Finite System Composition and Interaction
: In this article, it is proven for finite systems that if by reciprocal interaction, one finite system determines the action of another finite system, then both systems become sub...
Johannes Reich