Sciweavers

1019 search results - page 43 / 204
» Petri Net Transformations in the
Sort
View
KBSE
2005
IEEE
14 years 1 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
ISVC
2007
Springer
14 years 1 months ago
Building Petri Nets from Video Event Ontologies
Video event understanding requires a formalism that can model complex logical temporal and spatial relations between composing sub-events. In this paper we argue that the Petri-Net...
Gal Lavee, Artyom Borzin, Ehud Rivlin, Michael Rud...
DEXAW
2003
IEEE
99views Database» more  DEXAW 2003»
14 years 29 days ago
A Coloured Petri Net Trust Model
Public-key infrastructures are a prerequisite for security in distributed systems and for reliable electronic commerce. It is their goal to provide the authenticity of public keys...
Peter Lory
TACAS
1997
Springer
197views Algorithms» more  TACAS 1997»
13 years 11 months ago
Design/CPN - A Computer Tool for Coloured Petri Nets
In this paper, we describe the computer tool Design CPN supporting editing, simulation, and state space analysis of Coloured Petri Nets. So far, approximately 40 man-years have bee...
Søren Christensen, Jens Bæk Jø...
BPM
2000
Springer
133views Business» more  BPM 2000»
13 years 11 months ago
Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques
Workflow management systems facilitate the everyday operation of business processes by taking care of the logistic control of work. In contrast to traditional information systems, ...
Wil M. P. van der Aalst