Sciweavers

274 search results - page 31 / 55
» Formal procedural security modeling and analysis
Sort
View
ASM
2010
ASM
14 years 2 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...
ISER
2004
Springer
117views Robotics» more  ISER 2004»
14 years 1 months ago
Synthesis and Analysis of Non-Reactive Controllers for Multi-Robot Sequential Task Domains
In this paper we present a macroscopic model for the analysis of homogeneous task-directed multi-robot systems (MRS). The model is used to compute the probability that a given MRS ...
Chris Jones, Maja J. Mataric
SAFECOMP
2007
Springer
14 years 1 months ago
Using Deductive Cause-Consequence Analysis (DCCA) with SCADE
Abstract. Esterel Technologies’ SCADE Suite is one of the most important development tools for software for safety-critical systems. It is used for designing many critical compon...
Matthias Güdemann, Frank Ortmeier, Wolfgang R...
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
14 years 2 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
IEEEICCI
2006
IEEE
14 years 1 months ago
SenseNet: A Knowledge Representation Model for Computational Semantics
Knowledge representation is essential for semantics modeling and intelligent information processing. For decades researchers have proposed many knowledge representation techniques...
Ping Chen, Wei Ding 0003, Chengmin Ding