Sciweavers

1023 search results - page 41 / 205
» A Formal Method for Program Slicing
Sort
View
NSPW
1998
ACM
15 years 5 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
AFP
2008
Springer
245views Formal Methods» more  AFP 2008»
15 years 7 months ago
Self-adjusting Computation with Delta ML
Abstract. In self-adjusting computation, programs respond automatically and efficiently to modifications to their data by tracking the dynamic data dependences of the computation ...
Umut A. Acar, Ruy Ley-Wild
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 2 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
IJCAI
1993
15 years 2 months ago
Notes on Formalizing Context
These notes discuss formalizing contexts as first class objects. The basic relation is ist(c, p). It asserts that the proposition p is true in the context c. The most important f...
John McCarthy
ISSTA
2009
ACM
15 years 8 months ago
A formal analysis of requirements-based testing
The aim of requirements-based testing is to generate test cases from a set of requirements for a given system or piece of software. In this paper we propose a formal semantics for...
Charles Pecheur, Franco Raimondi, Guillaume Brat