Sciweavers

1894 search results - page 97 / 379
» A TLA Proof System
Sort
View
152
Voted
CSFW
2010
IEEE
15 years 4 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
LICS
1987
IEEE
15 years 4 months ago
A Framework for Defining Logics
The Edinburgh Logical Framework (LF) provides a means to define (or present) logics. It is based on a general treatment of syntax, rules, and proofs by means of a typed -calculus ...
Robert Harper, Furio Honsell, Gordon D. Plotkin
COMBINATORICS
1998
102views more  COMBINATORICS 1998»
15 years 14 days ago
Inclusion-Exclusion and Network Reliability
Based on a recent improvement of the inclusion-exclusion principle, we present a new approach to network reliability problems. In particular, we give a new proof of a result of Sh...
Klaus Dohmen
SCP
2002
98views more  SCP 2002»
15 years 13 days ago
Reasoning about real-time repetitions: terminating and nonterminating
It is common for a real-time system to contain a nonterminating process monitoring an input and controlling an output. Hence, a real-time program development method needs to suppo...
Ian J. Hayes
FC
1998
Springer
96views Cryptology» more  FC 1998»
15 years 5 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss