Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
Mind-boggling complexity of EDA tools necessitates reuse of intellectual property in any large-scale commercial or academic operation. However, due to the nature of software, a to...
Redundancy can improve the availability of components in service-oriented systems. However, predicting and quantifying the effects of different redundancy strategies can be a comp...
Semantic Web is regarded as the next generation of the World Wide Web. It provides not only the structure of the web but also meaningful semantics for the information presented. T...
Yue Tang, Jin Song Dong, Jing Sun, Brendan P. Maho...
This paper describes an experiment to use the Spin model checking system to support automated verification of time partitioning in the Honeywell DEOS real-time scheduling kernel. ...
John Penix, Willem Visser, Eric Engstrom, Aaron La...