Sciweavers

1446 search results - page 153 / 290
» Formal analysis of hardware requirements
Sort
View
CCS
2008
ACM
14 years 19 days ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
CAV
2009
Springer
155views Hardware» more  CAV 2009»
14 years 11 months ago
Better Quality in Synthesis through Quantitative Objectives
Abstract. Most specification languages express only qualitative constraints. However, among two implementations that satisfy a given specification, one may be preferred to another....
Roderick Bloem, Krishnendu Chatterjee, Thomas A. H...
RV
2007
Springer
74views Hardware» more  RV 2007»
14 years 4 months ago
Rollback Atomicity
We introduce a new non-interference criterion for concurrent programs: rollback atomicity. Similarly to other definitions of atomicity, rollback atomicity of a given concurrent ex...
Serdar Tasiran, Tayfun Elmas
SCS
2003
13 years 12 months ago
Safety Assurance Contracts for Integrated Modular Avionics
This paper describes a method for performing safety analysis on an Integrated Modular Avionics system in a manner which supports the incremental development and change of system c...
Philippa Conmy, Mark Nicholson, John A. McDermid
COMPSAC
2009
IEEE
14 years 5 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz