Sciweavers

537 search results - page 85 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
IEEEARES
2007
IEEE
15 years 6 months ago
Models for automatic generation of safety-critical real-time systems
Model-based development has become state of the art in software engineering. A number of tools, like Matlab/Simulink or SCADE, are available for the automatic generation of applic...
Christian Buckl, Matthias Regensburger, Alois Knol...
ACSAC
2007
IEEE
15 years 6 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
B
2007
Springer
15 years 6 months ago
Symmetry Reduction for B by Permutation Flooding
Symmetry reduction is an established method for limiting the amount of states that have to be checked during exhaustive model checking. The idea is to only verify a single represen...
Michael Leuschel, Michael J. Butler, Corinna Sperm...
MIDDLEWARE
2004
Springer
15 years 5 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
POPL
2006
ACM
16 years 2 days ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam