Sciweavers

1676 search results - page 145 / 336
» Formal System Development with KIV
Sort
View
SP
1997
IEEE
106views Security Privacy» more  SP 1997»
15 years 9 months ago
Secure Software Architectures
The computer industry is increasingly dependent on open architectural standards for their competitive success. This paper describes a new approach to secure system design in which...
Mark Moriconi, Xiaolei Qian, Robert A. Riemenschne...
HASE
2007
IEEE
15 years 8 months ago
Model Validation using Automatically Generated Requirements-Based Tests
In current model-based development practice, validation that we are building a correct model is achieved by manually deriving requirements-based test cases for model testing. Mode...
Ajitha Rajan, Michael W. Whalen, Mats Per Erik Hei...
CONCUR
2006
Springer
15 years 8 months ago
Concurrent Rewriting for Graphs with Equivalences
Several applications of graph rewriting systems (notably, some encodings of calculi with name passing) require rules which, besides deleting and generating graph items, are able to...
Paolo Baldan, Fabio Gadducci, Ugo Montanari
SAS
1991
Springer
102views Formal Methods» more  SAS 1991»
15 years 8 months ago
Equational Logics
d Abstract) Marcelo Fiore1 Chung-Kil Hur2,3 Computer Laboratory University of Cambridge Cambridge, UK We introduce an abstract general notion of system of equations between terms,...
Yong Sun
JCS
2007
103views more  JCS 2007»
15 years 4 months ago
Risk management for distributed authorization
Distributed authorization takes into account several elements, including certificates that may be provided by non-local actors. While most trust management systems treat all asse...
Christian Skalka, Xiaoyang Sean Wang, Peter C. Cha...