Sciweavers

OOPSLA
2000
Springer
13 years 11 months ago
Formal specification of CORBA services: experience and lessons learned
Rémi Bastide, Philippe A. Palanque, Ousmane...
AGENTS
1997
Springer
13 years 11 months ago
A Layered Architecture for Office Delivery Robots
Reid G. Simmons, Richard Goodwin, Karen Zita Haigh...
AGENTS
1997
Springer
13 years 11 months ago
Basic Agents for Visual/Motor Coordination of a Mobile Robot
Maria C. García-Alegre, Felicidad Recio
ACSAC
1997
IEEE
13 years 11 months ago
An Efficient Message Authentication Scheme for Link State Routing
We study methods for reducing the cost of secure link state routing. In secure link state routing, routers may need to verify the authenticity of many routing updates, and some ro...
S. Cheung
SAFECOMP
1998
Springer
13 years 11 months ago
Refinement of Safety-Related Hazards into Verifiable Code Assertions
: This paper presents a process for the stepwise refinement of safety code assertions from identified system hazards. The code assertions are intended for use in system safety veri...
Ken Wong, Jeff Joyce
SAFECOMP
1998
Springer
13 years 11 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha
FOSAD
2000
Springer
13 years 11 months ago
The Logic of Authentication Protocols
Paul F. Syverson, Iliano Cervesato
FOSAD
2000
Springer
13 years 11 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...
FOSAD
2000
Springer
13 years 11 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
FOSAD
2000
Springer
13 years 11 months ago
Notes on Nominal Calculi for Security and Mobility
Abstract. There is great interest in applying nominal calculi--computational formalisms that include dynamic name generation--to the problems of programming, specifying, and verify...
Andrew D. Gordon