Sciweavers

2838 search results - page 39 / 568
» Verifying Controlled Components
Sort
View
MOBILWARE
2009
ACM
14 years 3 months ago
A Component-Based Approach for Realizing User-Centric Adaptive Systems
We discuss a generic architecture for building user-centric systems. The characteristic feature of such systems is a control loop that monitors the user’s state, and produces a h...
Gilbert Beyer, Moritz Hammer, Christian Kroiss, An...
COMPSEC
2010
124views more  COMPSEC 2010»
13 years 7 months ago
A provably secure secret handshake with dynamic controlled matching
Abstract A Secret Handshake is a protocol that allows two users to mutually verify one another’s properties, and in case of simultaneous matching, to share a key used to secure s...
Alessandro Sorniotti, Refik Molva
SACMAT
2009
ACM
14 years 3 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
WORDS
2005
IEEE
14 years 2 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 9 months ago
Bus Protocols: MSC-Based Specifications and Translation into Program of Verification Tool for Formal Verification
Message Sequence Charts (MSCs) are an appealing visual formalism mainly used in the early stages of system design to capture the system requirements. However, if we move towards a...
Kamrul Hasan Talukder