Sciweavers

39 search results - page 6 / 8
» Formal Analysis of Key Integrity in PKCS
Sort
View
ISOLA
2010
Springer
13 years 4 months ago
Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset
Abstract. The complexity of today's embedded systems and their development trajectories requires a systematic, model-driven design approach, supported by tooling wherever poss...
Twan Basten, Emiel van Benthum, Marc Geilen, Marti...
TCBB
2008
137views more  TCBB 2008»
13 years 6 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
KES
2006
Springer
13 years 6 months ago
Solving power and trust conflicts through argumentation in agent-mediated knowledge distribution
Distributing pieces of knowledge in large, usually distributed organizations is a central problem in Knowledge and Organization management. Policies for distributing knowledge and...
Carlos Iván Chesñevar, Ramón ...
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
14 years 12 days ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
JAR
2000
145views more  JAR 2000»
13 years 6 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro