Sciweavers

239 search results - page 39 / 48
» Proof Techniques for Cryptographic Processes
Sort
View
QSIC
2007
IEEE
14 years 2 months ago
Verifying Noninterference in a Cyber-Physical System The Advanced Electric Power Grid
The advanced electric power grid is a complex real-time system having both Cyber and Physical components. While each component may function correctly, independently, their composi...
Yan Sun, Bruce M. McMillin, Xiaoqing Frank Liu, Da...
FOSSACS
2005
Springer
14 years 2 months ago
Composition and Decomposition in True-Concurrency
The idea of composition and decomposition to obtain computability results is particularly relevant for true-concurrency. In contrast to the interleaving world, where composition an...
Sibylle B. Fröschle
TOPLAS
1998
133views more  TOPLAS 1998»
13 years 8 months ago
A Systematic Study of Functional Language Implementations
Abstract: We introduce a unified framework to describe, relate, compare and classify functional language implementations. The compilation process is expressed as a succession of p...
Rémi Douence, Pascal Fradet
FMCO
2009
Springer
134views Formal Methods» more  FMCO 2009»
13 years 6 months ago
Verification of Context-Dependent Channel-Based Service Models
Abstract. The paradigms of service-oriented computing and modeldriven development are becoming of increasing importance in the field of software engineering. According to these par...
Natallia Kokash, Christian Krause, Erik P. de Vink
DAC
2007
ACM
14 years 9 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt