Abstract. The intruder deduction problem for an electronic purse protocol with blind signatures is considered. The algebraic properties of the protocol are modeled by an equational...
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
We describe a general model for embedding object-oriented constructs into calculi of mobile agents. The model results from extending agents with methods and primitives for message ...
Modern software applications ranging from enterprise to embedded systems are becoming increasingly complex, and require very high levels of dependability assurance. The most effec...
Zhenbang Chen, Zhiming Liu, Volker Stolz, Lu Yang,...
In this paper we describe a framework for reasoning about temporal explanation problems, which is based on our previous work on model-based diagnosis of dynamic systems. We use an ...