We present a novel approach which facilitates formal verification of component-based software application families using model checking. This approach enables effective composition...
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
This paper illustrates the development of an approximate analytical model for a communication network providing integrated services to a population of mobile users, and presents p...
Marco Ajmone Marsan, Salvatore Marano, Carlo Mastr...
Today, bibliographical information is kept in a variety of digital libraries available on the Internet. The integration of bibliographical data is considered as one of the most im...
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...