Sciweavers

4047 search results - page 698 / 810
» Algebraic Model Checking
Sort
View
146
Voted
WOA
2010
14 years 10 months ago
Using Mobile Agents for Secure Biometric Authentication
This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastru...
Marco Tranquillin, Carlo Ferrari, Michele Moro
IEEEARES
2009
IEEE
14 years 10 months ago
Software Inspections Using Guided Checklists to Ensure Security Goals
Security is a crucial issue in many modern software systems and can lead to immense costs if required security goals are not fulfilled. Fewer techniques exist to address the syste...
Frank Elberzhager, Alexander Klaus, Marek Jawurek
COMSIS
2010
14 years 10 months ago
A domain-specific language for defining static structure of database applications
Abstract. In this paper we present DOMMLite - an extensible domainspecific language (DSL) for static structure definition of databaseoriented applications. The model-driven enginee...
Igor Dejanovic, Gordana Milosavljevic, Branko Peri...
119
Voted
JCS
2010
80views more  JCS 2010»
14 years 7 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
135
Voted
TCAD
2010
121views more  TCAD 2010»
14 years 7 months ago
Translation Validation of High-Level Synthesis
The growing complexity of systems and their implementation into silicon encourages designers to look for model designs at higher levels of abstraction and then incrementally build ...
Sudipta Kundu, Sorin Lerner, Rajesh K. Gupta