This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
This paper presents a toolkit for spreadsheet visualization based on logical areas, semantic classes and data Logical areas, semantic classes and data modules are abstract represe...
In this paper, we present an action language which is called AP oss in order to perform reasoning about actions under uncertainty. This language is based on a possibilistc logic pr...
Juan Carlos Nieves, Mauricio Osorio, Ulises Cort&e...