Sciweavers

5499 search results - page 15 / 1100
» Generalized Rewrite Theories
Sort
View
LPAR
2005
Springer
14 years 1 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
ATAL
2008
Springer
13 years 9 months ago
Model-checking agent refinement
We present a proof-technique for reducing the nondeterminbstract agent specifications in a BDI framework by means of refinement. We implement the operational semantics of agent sp...
Lacramioara Astefanoaei, Frank S. de Boer
KBSE
2000
IEEE
14 years 52 min ago
Circular Coinductive Rewriting
Circular coinductive rewriting is a new method for proving behavioral properties, that combines behavioral rewriting with circular coinduction. This method is implemented in our n...
Joseph A. Goguen, Kai Lin, Grigore Rosu