Sciweavers

1894 search results - page 243 / 379
» A TLA Proof System
Sort
View
CSFW
2000
IEEE
15 years 8 months ago
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
In this paper we present an improved logic for analysing authentication properties of cryptographic protocols, based on the SVO logic of Syverson and van Oorschot. Such logics are...
Anthony H. Dekker
SP
2000
IEEE
121views Security Privacy» more  SP 2000»
15 years 8 months ago
A Security Infrastructure for Distributed Java Applications
We describe the design and implementation of a security infrastructure for a distributed Java application. This work is inspired by SDSI/SPKI, but has a few twists of its own. We ...
Dirk Balfanz, Drew Dean, Mike Spreitzer
HASE
1998
IEEE
15 years 8 months ago
Incremental Development of a High Integrity Compiler: Experience from an Industrial Development
We have developed and successfully applied a technique to build a high integrity compiler from Pasp, a Pascal-like language, to Asp, the target language for a high integrity proce...
Susan Stepney
WIFT
1998
IEEE
153views Hardware» more  WIFT 1998»
15 years 8 months ago
Reasoning with UML Class Diagrams
The Unified Modeling Language (UML) is likely to become an important industry standard language for modelling object-oriented systems. However, its use as a precise analysis tool ...
Andy S. Evans
ECAI
1998
Springer
15 years 8 months ago
Integrating Abduction and Induction
In this paper we describe an approach for integrating abduction and induction in the ILP setting of learning from interpretations with the aim of solving the problem of incomplete...
Fabrizio Riguzzi