Sciweavers

293 search results - page 31 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
ICDE
2006
IEEE
156views Database» more  ICDE 2006»
16 years 6 months ago
Sovereign Joins
We present a secure network service for sovereign information sharing whose only trusted component is an off-theshelf secure coprocessor. The participating data providers send enc...
Rakesh Agrawal, Dmitri Asonov, Murat Kantarcioglu,...
ROBOCUP
2007
Springer
159views Robotics» more  ROBOCUP 2007»
15 years 11 months ago
Model Checking Hybrid Multiagent Systems for the RoboCup
Abstract. This paper shows how multiagent systems can be modeled by a combination of UML statecharts and hybrid automata. This allows formal system cation on different levels of ab...
Ulrich Furbach, Jan Murray, Falk Schmidsberger, Fr...
CADE
2008
Springer
16 years 5 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
JLP
2010
73views more  JLP 2010»
15 years 8 days ago
Composing model programs for analysis
Model programs are high-level behavioral specifications used for software testing and design analysis. Composition of model programs is a versatile technique that, at one end of t...
Margus Veanes, Jonathan Jacky
TROB
2002
169views more  TROB 2002»
15 years 5 months ago
Constructing reconfigurable software for machine control systems
Reconfigurable software is highly desired for automated machine tool control systems for low-cost products and short time to market. In this paper, we propose a software architectu...
Shige Wang, Kang G. Shin