Sciweavers

624 search results - page 55 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
CSFW
2012
IEEE
13 years 6 months ago
Verifying Privacy-Type Properties in a Modular Way
—Formal methods have proved their usefulness for analysing the security of protocols. In this setting, privacy-type security properties (e.g. vote-privacy, anonymity, unlinkabili...
Myrto Arapinis, Vincent Cheval, Stéphanie D...
AINA
2005
IEEE
15 years 9 months ago
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications
In the present study, THUBioGrid, an experimental distributed computing application for bioinformatics (BioGrid) is proposed. THUBioGrid incorporates directory services (data and ...
Chao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan
WICSA
2008
15 years 5 months ago
A Modifiable Agent-Based Software Architecture for Intelligent Virtual Environments for Training
During the last years, Intelligent Virtual Environments for Training have become a quite popular application of computer science to education. However, little attention is being p...
Gonzalo Méndez, Angélica de Antonio
WOSP
2004
ACM
15 years 9 months ago
Software performance modelling using PEPA nets
Modelling and analysing distributed and mobile software systems is a challenging task. PEPA nets—coloured stochastic Petri nets—are a recently introduced modelling formalism w...
Stephen Gilmore, Jane Hillston, Leïla Kloul, ...
IWFM
2003
15 years 5 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins