Sciweavers

297 search results - page 43 / 60
» Model Checking Guarded Protocols
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
14 years 3 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
DEXAW
1996
IEEE
100views Database» more  DEXAW 1996»
14 years 2 months ago
An Incremental Update Propagation Scheme for a Cooperative Transaction Model
Engineeringdesign applications require the support of long transactions in cooperative environments, The problem of the existing copy/update/merge approaches is that thepartial ef...
Am-suk Oh, Jin-oh Choi, Bonghee Hong
FDL
2004
IEEE
14 years 1 months ago
UML System-Level Analysis and Design of Secure Communication Schemes for Embedded Systems
In this work we develop a secure communication protocol in the context of a Remote Meter Reading (RMR) System. We first analyze existing standards in secure communication (e.g. IP...
Mauro Prevostini, Giuseppe Piscopo, I. Stefanini
CAV
2009
Springer
176views Hardware» more  CAV 2009»
14 years 10 months ago
PAT: Towards Flexible Verification under Fairness
Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing ...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jun Pa...
FMCO
2009
Springer
134views Formal Methods» more  FMCO 2009»
13 years 7 months ago
Verification of Context-Dependent Channel-Based Service Models
Abstract. The paradigms of service-oriented computing and modeldriven development are becoming of increasing importance in the field of software engineering. According to these par...
Natallia Kokash, Christian Krause, Erik P. de Vink