Sciweavers

3224 search results - page 519 / 645
» On Checking Model Checkers
Sort
View
CADE
2011
Springer
12 years 10 months ago
ASASP: Automated Symbolic Analysis of Security Policies
We describe asasp, a symbolic reachability procedure for the analysis of administrative access control policies. The tool represents access policies and their administrative action...
Francesco Alberti, Alessandro Armando, Silvio Rani...
CVPR
2009
IEEE
15 years 5 months ago
Tour the World: building a web-scale landmark recognition engine
Modeling and recognizing landmarks at world-scale is a useful yet challenging task. There exists no readily available list of worldwide landmarks. Obtaining reliable visual mode...
Yantao Zheng, Ming Zhao 0003, Yang Song, Hartwig A...
WWW
2010
ACM
14 years 5 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
CSFW
2009
IEEE
14 years 4 months ago
ASPIER: An Automated Framework for Verifying Security Protocol Implementations
Abstract. We present aspier – the first framework that combines software model checking with a standard protocol security model to analyze authentication and secrecy properties ...
Sagar Chaki, Anupam Datta
ISQED
2008
IEEE
112views Hardware» more  ISQED 2008»
14 years 4 months ago
Robust Analog Design for Automotive Applications by Design Centering with Safe Operating Areas
The effects of random variations during the manufacturing process on devices can be simulated as a variation of transistor parameters. Device degradation, due to temperature or vo...
Udo Sobe, Karl-Heinz Rooch, Andreas Ripp, Michael ...