Sciweavers

35 search results - page 7 / 7
» A New Model Checking Approach for Verifying Agent Communicat...
Sort
View
P2P
2003
IEEE
13 years 10 months ago
Establishing Trust in Distributed Storage Providers
— Corporate IT as well as individuals show increasing interest in reliable outsourcing of storage infrastructure. Decentralized solutions with their resilience against partial ou...
Germano Caronni, Marcel Waldvogel
ICC
2007
IEEE
171views Communications» more  ICC 2007»
13 years 11 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
ASE
2002
160views more  ASE 2002»
13 years 5 months ago
Proving Invariants of I/O Automata with TAME
This paper describes a specialized interface to PVS called TAME (Timed Automata Modeling Environment) which provides automated support for proving properties of I/O automata. A maj...
Myla Archer, Constance L. Heitmeyer, Elvinia Ricco...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 9 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
EJC
2008
13 years 6 months ago
Center Fragments for Upscaling and Verification in Database Semantics
The notion of a fragment was coined by Montague 1974 to illustrate the formal handling of certain puzzles, such as de dicto/de re, in a truth-conditional semantics for natural lan...
Roland Hausser