Sciweavers

553 search results - page 81 / 111
» Verified, Executable Parsing
Sort
View
POLICY
2001
Springer
14 years 1 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
DSN
2000
IEEE
14 years 1 months ago
Loki: A State-Driven Fault Injector for Distributed Systems
Distributed applications can fail in subtle ways that depend on the state of multiple parts of a system. This complicates the validation of such systems via fault injection, since...
Ramesh Chandra, Ryan M. Lefever, Michel Cukier, Wi...
ISSRE
2000
IEEE
14 years 1 months ago
Can Intuition Become Rigorous? Foundations for UML Model Verification Tools
The Unified Modeling Language, UML, is the objectoriented notation adopted as the standard for objectoriented Analysis and Design by the Object Management Group. This paper report...
José Luis Fernández Alemán, J...
CSFW
1999
IEEE
14 years 29 days ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
CSMR
1998
IEEE
14 years 27 days ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont