Sciweavers

227 search results - page 16 / 46
» Formal verification of systems with an unlimited number of c...
Sort
View
BIRTHDAY
2007
Springer
14 years 11 days ago
Applying a Theorem Prover to the Verification of Optimistic Replication Algorithms
Abstract. The Operational Transformation (OT) approach is a technique for supporting optimistic replication in collaborative and mobile systems. It allows the users to concurrently...
Abdessamad Imine, Michaël Rusinowitch
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 10 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 16 days ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
IEAAIE
2004
Springer
14 years 1 months ago
Cell Modeling Using Agent-Based Formalisms
The systems biology community is building increasingly complex models and simulations of cells and other biological entities. This community is beginning to look at alternatives t...
Ken Webb, Tony White
ENTCS
2008
142views more  ENTCS 2008»
13 years 8 months ago
An Open System Operational Semantics for an Object-Oriented and Component-Based Language
Object orientation and component-based development have both proven useful for the elaboration of open distributed systems. These paradigms are offered by the Creol language. Creo...
Jasmin Christian Blanchette, Olaf Owe