Sciweavers

2043 search results - page 352 / 409
» Reasoning About Security Models
Sort
View
POPL
2003
ACM
14 years 10 months ago
From symptom to cause: localizing errors in counterexample traces
There is significant room for improving users' experiences with model checking tools. An error trace produced by a model checker can be lengthy and is indicative of a symptom...
Thomas Ball, Mayur Naik, Sriram K. Rajamani
POPL
2010
ACM
14 years 7 months ago
A Theory of Indirection via Approximation
Building semantic models that account for various kinds of indirect reference has traditionally been a difficult problem. Indirect reference can appear in many guises, such as hea...
Aquinas Hobor, Robert Dockins, Andrew W. Appel
ICYCS
2008
IEEE
14 years 4 months ago
Trustworthiness and Quality of Context Information
Context-aware service platforms use context information to customize their services to the current users’ situation. Due to technical limitations in sensors and context reasonin...
Ricardo Neisse, Maarten Wegdam, Marten van Sindere...
DAGSTUHL
2004
13 years 11 months ago
An Example for Metamodeling Syntax and Semantics of Two Languages, their Transformation, and a Correctness Criterion
We study a metamodel for the Entity Relationship (ER) and the Relational data model. We do this by describing the syntax of the ER data model by introducing classes for ER schemata...
Martin Gogolla
IACR
2011
88views more  IACR 2011»
12 years 9 months ago
Storing Secrets on Continually Leaky Devices
We consider the question of how to store a value secretly on devices that continually leak information about their internal state to an external attacker. If the secret value is s...
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Da...