Sciweavers

624 search results - page 30 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
APSCC
2008
IEEE
15 years 6 months ago
Contract-Based Security Monitors for Service Oriented Software Architecture
Monitors have been used for real-time systems to ensure proper behavior; however, most approaches do not allow for the addition of relevant fields required to identify and react t...
Alexander M. Hoole, Issa Traoré
EUROSPI
2005
Springer
15 years 9 months ago
Safety Methods in Software Process Improvement
Even if the application developers produce software in accordance with the customer requirements, they cannot guarantee that the software will behave in a safe way during the lifet...
Torgrim Lauritsen, Tor Stålhane
CISC
2007
Springer
133views Cryptology» more  CISC 2007»
15 years 10 months ago
Unlinkable Randomizable Signature and Its Application in Group Signature
We formalize a generic method of constructing efficient group signatures, specifically, we define new notions of unlinkable randomizable signature, indirectly signable signature ...
Sujing Zhou, Dongdai Lin
WOSP
2004
ACM
15 years 9 months ago
From UML activity diagrams to Stochastic Petri nets: application to software performance engineering
Over the last decade, the relevance of performance evaluation in the early stages of the software development life-cycle has been steadily rising. We honestly believe that the int...
Juan Pablo López-Grao, José Mersegue...
FMICS
2010
Springer
15 years 4 months ago
Correctness of Sensor Network Applications by Software Bounded Model Checking
We investigate the application of the software bounded model checking tool CBMC to the domain of wireless sensor networks (WSNs). We automatically generate a software behavior mode...
Frank Werner, David Faragó