Abstract. This paper presents a systematic consideration of the major issues involved in translation of executable design level software specification languages to directly model-c...
Fei Xie, Vladimir Levin, Robert P. Kurshan, James ...
Abstract. Recently, the Csignature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems hav...
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
Abstract. Knowledge tailoring is a powerful tool to customize a system according to the particular view and interests of the user, in such a way that usability of the system become...
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...