Sciweavers

293 search results - page 31 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
14 years 9 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
ROBOCUP
2007
Springer
159views Robotics» more  ROBOCUP 2007»
14 years 1 months ago
Model Checking Hybrid Multiagent Systems for the RoboCup
Abstract. This paper shows how multiagent systems can be modeled by a combination of UML statecharts and hybrid automata. This allows formal system cation on different levels of ab...
Ulrich Furbach, Jan Murray, Falk Schmidsberger, Fr...
CADE
2008
Springer
14 years 8 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
JLP
2010
73views more  JLP 2010»
13 years 2 months ago
Composing model programs for analysis
Model programs are high-level behavioral specifications used for software testing and design analysis. Composition of model programs is a versatile technique that, at one end of t...
Margus Veanes, Jonathan Jacky
TROB
2002
169views more  TROB 2002»
13 years 7 months ago
Constructing reconfigurable software for machine control systems
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
Shige Wang, Kang G. Shin