Sciweavers

253 search results - page 9 / 51
» How to Transform an Analyzer into a Verifier
Sort
View
CCS
2007
ACM
14 years 1 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
CORR
2010
Springer
137views Education» more  CORR 2010»
13 years 7 months ago
Verification of Java Bytecode using Analysis and Transformation of Logic Programs
State of the art analyzers in the Logic Programming (LP) paradigm are nowadays mature and sophisticated. They allow inferring a wide variety of global properties including terminat...
Elvira Albert, Miguel Gómez-Zamalloa, Laure...
CORR
2006
Springer
121views Education» more  CORR 2006»
13 years 7 months ago
Use of UML and Model Transformations for Workflow Process Definitions
Currently many different modeling languages are used for workflow definitions in BPM systems. Authors of this paper analyze the two most popular graphical languages, with highest p...
Audris Kalnins, Valdis Vitolins
IFM
2009
Springer
155views Formal Methods» more  IFM 2009»
13 years 5 months ago
Application of Graph Transformation in Verification of Dynamic Systems
Abstract. A communication system evolves dynamically with the addition and deletion of services. In our previous work [12], a graph transformation system (GTS) was used to model th...
Zarrin Langari, Richard J. Trefler
CONCUR
2001
Springer
13 years 12 months ago
A Static Analysis Technique for Graph Transformation Systems
In this paper we introduce a static analysis technique for graph transformation systems. We present an algorithm which, given a graph transformation system and a start graph, produ...
Paolo Baldan, Andrea Corradini, Barbara König