This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
We introduce in this paper new communication and synchronization constructs which allow deterministic processes, communicating asynchronously via unbounded FIFO bu ers, to cope wi...
The combination of two security protocols, a simple shared-key communication protocol and the Di e-Hellman key distribution protocol, is modeled formally and proved correct. The m...
SHYSTER-MYCIN combines a case-based legal expert system (SHYSTER) with a rule-based expert system (MYCIN) to form a hybrid legal expert system. MYCIN’s reporting has been improv...
Thomas A. O'Callaghan, James Popple, Eric McGreath
Spider diagram systems provide a visual language that extends the popular and intuitive Venn diagrams and Euler circles. Designed to complement object-oriented modelling notations ...