Sciweavers

1286 search results - page 134 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
123
Voted
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 4 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
98
Voted
EUROSYS
2006
ACM
15 years 9 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
114
Voted
ATAL
2008
Springer
15 years 2 months ago
A distributed normative infrastructure for situated multi-agent organisations
In most of the existing approaches to the design of multiagent systems, there is no clear way in which to relate organisational and normative structures to the model of the enviro...
Fabio Y. Okuyama, Rafael H. Bordini, Antônio...
PROMISE
2010
14 years 7 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo
94
Voted
PERCOM
2008
ACM
16 years 10 days ago
A tamper-proof and lightweight authentication scheme
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, w...
Ghaith Hammouri, Erdinç Öztürk, Berk Sunar