Sciweavers

335 search results - page 14 / 67
» Reasoning about Probabilistic Security Using Task-PIOAs
Sort
View
TSE
2010
151views more  TSE 2010»
13 years 6 months ago
The Probabilistic Program Dependence Graph and Its Application to Fault Diagnosis
This paper presents an innovative model of a program’s internal behavior over a set of test inputs, called the probabilistic program dependence graph (PPDG), that facilitates pr...
George K. Baah, Andy Podgurski, Mary Jean Harrold
CCS
2007
ACM
14 years 1 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
HAIS
2008
Springer
13 years 8 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
ICAC
2009
IEEE
14 years 2 months ago
Multi-perspective evaluation of self-healing systems using simple probabilistic models
In this paper we construct an evaluation framework for a self-healing system, VM-Rejuv – a virtual machine based rejuvenation scheme for web-application servers – using simple...
Rean Griffith, Gail E. Kaiser, Javier Alonso L&oac...
ASIAN
2003
Springer
170views Algorithms» more  ASIAN 2003»
14 years 26 days ago
Model Checking Probabilistic Distributed Systems
Protocols for distributed systems make often use of random transitions to achieve a common goal. A popular example are randomized leader election protocols. We introduce probabilis...
Benedikt Bollig, Martin Leucker