Sciweavers

354 search results - page 44 / 71
» On Obligations
Sort
View
POPL
2006
ACM
14 years 10 months ago
Small bisimulations for reasoning about higher-order imperative programs
We introduce a new notion of bisimulation for showing contextual equivalence of expressions in an untyped lambda-calculus with an explicit store, and in which all expressed values...
Vasileios Koutavas, Mitchell Wand
ICSE
2008
IEEE-ACM
14 years 10 months ago
3rd international workshop on advances and applications of problem frames
Central to the problem frames approach is the distinction of three different descriptions: requirements R, domain assumptions W and specifications S, tied together with the socall...
Thein Than Tun, Jon G. Hall, Lucia Rapanotti, Karl...
ESORICS
2002
Springer
14 years 9 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
ASM
2010
ASM
14 years 4 months ago
A Basis for Feature-Oriented Modelling in Event-B
Abstract. Feature-oriented modelling is a well-known approach for Software Product Line (SPL) development. It is a widely used method when developing groups of related software. Wi...
Jennifer Sorge, Michael Poppleton, Michael Butler
ACSC
2009
IEEE
14 years 4 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank