Sciweavers

289 search results - page 55 / 58
» Formal Verification of Security Model Using SPR Tool
Sort
View
ICWE
2010
Springer
13 years 6 months ago
Business Process Compliance through Reusable Units of Compliant Processes
Compliance management is essential for ensuring that organizational business processes and supporting information systems are in accordance with a set of prescribed requirements or...
David Schumm, Oktay Türetken, Natallia Kokash...
CASES
2011
ACM
12 years 7 months ago
Enabling parametric feasibility analysis in real-time calculus driven performance evaluation
This paper advocates a rigorously formal and compositional style for obtaining key performance and/or interface metrics of systems with real-time constraints. We propose a hierarc...
Alena Simalatsar, Yusi Ramadian, Kai Lampka, Simon...
POPL
2010
ACM
13 years 10 months ago
Programming with angelic nondeterminism
Angelic nondeterminism can play an important role in program development. It simplifies specifications, for example in deriving programs with a refinement calculus; it is the form...
Rastislav Bodík, Satish Chandra, Joel Galen...
USS
2008
13 years 10 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
ACSAC
2006
IEEE
14 years 1 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...