Sciweavers

32032 search results - page 139 / 6407
» Verified programming in Guru
Sort
View
TPHOL
2005
IEEE
15 years 10 months ago
Verifying a Secure Information Flow Analyzer
Abstract. Denotational semantics for a substantial fragment of Java is formalized by deep embedding in PVS, making extensive use of dependent types. A static analyzer for secure in...
David A. Naumann
ASM
2005
ASM
15 years 10 months ago
Verifying Security Protocols: An ASM Approach
In this paper we present a modeling technique for security protocols using Abstract State Machines [BS03,Gur95] (ASMs). We describe how we model the different agents in the scenar...
Dominik Haneberg, Holger Grandy, Wolfgang Reif, Ge...
WSC
1996
15 years 6 months ago
Verifying and Validating Simulation Models
In this paper we discuss verification and validation of simulation models. The different approaches to deciding model validity are described, two different paradigms that relate v...
Robert G. Sargent
CJ
2010
80views more  CJ 2010»
15 years 4 months ago
Verifying a Synthesized Implementation of IEEE-754 Floating-Point Exponential Function using HOL
rder logic (HOL) theorem prover. The high ability of abstraction in the HOL verification system allows its use for the verification task over the whole design path of the circuit, ...
Behzad Akbarpour, Amr T. Abdel-Hamid, Sofiè...
FUIN
2008
82views more  FUIN 2008»
15 years 4 months ago
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme
We introduce Nuovo DRM, a digital rights management scheme aimed to provide formal and practical security. The scheme is based on a recent DRM scheme, which we formally specify in ...
Muhammad Torabi Dashti, Srijith Krishnan Nair, Hug...