Sciweavers

2291 search results - page 76 / 459
» Representational Reasoning and Verification
Sort
View
SIGSOFT
2005
ACM
14 years 9 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
COMPSAC
2010
IEEE
13 years 7 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
CADE
2006
Springer
14 years 9 months ago
Towards Self-verification of HOL Light
The HOL Light prover is based on a logical kernel consisting of about 400 lines of mostly functional OCaml, whose complete formal verification seems to be quite feasible. We would ...
John Harrison
ICPR
2006
IEEE
14 years 10 months ago
Off-line Signature Verification based on the Modified Direction Feature
Signature identification and verification has been a topic of interest and importance for many years in the area of biometrics. In this paper we present an effective method to per...
Stephane Armand, Michael Blumenstein, Vallipuram M...
TYPES
1998
Springer
14 years 1 months ago
Metatheory of Verification Calculi in LEGO - To what Extent Does Syntax Matter?
Investigating soundness and completeness of verification calculi for imperative programming languages is a challenging task. Incorrect results have been published in the past. We t...
Thomas Kleymann