Sciweavers

297 search results - page 41 / 60
» Model Checking Guarded Protocols
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 7 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
WISES
2003
13 years 11 months ago
Automatic Recovery of the TTP/A Sensor/Actuator Network
Abstract — Since sensor/actuator networks are to be used in error-prone environments, it is required that media access protocols for such networks are tolerant to failures. Field...
Wilfried Steiner, Wilfried Elmenreich
ICFEM
2009
Springer
14 years 4 months ago
Role-Based Symmetry Reduction of Fault-Tolerant Distributed Protocols with Language Support
Fault-tolerant (FT) distributed protocols (such as group membership, consensus, etc.) represent fundamental building blocks for many practical systems, e.g., the Google File System...
Péter Bokor, Marco Serafini, Neeraj Suri, H...
SOCO
2005
Springer
14 years 3 months ago
Improving Composition Support with Lightweight Metadata-Based Extensions of Component Models
Software systems that rely on the component paradigm build new components by assembling existing prefabricated components. Most currently available IDEs support graphical component...
Johann Oberleitner, Michael Fischer
SIGSOFT
2009
ACM
14 years 4 months ago
Automatic synthesis of behavior protocols for composable web-services
Web-services are broadly considered as an effective means to achieve interoperability between heterogeneous parties of a business process and offer an open platform for developing...
Antonia Bertolino, Paola Inverardi, Patrizio Pelli...