Sciweavers

1601 search results - page 88 / 321
» The affordable application of formal methods to software eng...
Sort
View
SIGSOFT
2005
ACM
14 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
SAC
2006
ACM
13 years 9 months ago
Transformation of B specifications into UML class diagrams and state machines
We propose a rule-based approach for transforming B abstract machines into UML diagrams. We believe that important insight into the structure underlying a B model can be gained by...
Houda Fekih, Leila Jemni Ben Ayed, Stephan Merz
ISSTA
2012
ACM
11 years 11 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
ISORC
2005
IEEE
14 years 2 months ago
RMMC Programming Model and Support Execution Engine in the TMO Programming Scheme
: While the conventional remote method invocation mechanism has been considered for a long time as the primary approach for facilitating interactions among real-time objects, a mul...
K. H. (Kane) Kim, Yuqing Li, Sheng Liu, Moon-hae K...
IFM
2010
Springer
152views Formal Methods» more  IFM 2010»
13 years 7 months ago
Specification and Verification of Model Transformations Using UML-RSDS
In this paper we describe techniques for the specification and verification of model transformations using a combination of UML and formal methods. The use of UML 2 notations to s...
Kevin Lano, Shekoufeh Kolahdouz Rahimi