Sciweavers

624 search results - page 67 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
COMPSAC
2009
IEEE
14 years 9 months ago
Towards Usable Solutions to Graphical Password Hotspot Problem
Click based graphical passwords that use background images suffer from hot-spot problem. Previous graphical password schemes based on recognition of images do not have a sufficient...
Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, ...
SAS
2000
Springer
15 years 3 months ago
Enforcing Design Constraints with Object Logic
Design constraints express essential behavioural properties of a software system. Two key elements of a scheme for enforcing design constraints are presented: a logic for describin...
Daniel Jackson
ICSE
2007
IEEE-ACM
15 years 12 months ago
A Perspective on the Future of Middleware-based Software Engineering
Middleware is a software layer that stands between the networked operating system and the application and provides well known reusable solutions to frequently encountered problems...
Mauro Caporuscio, Nikolaos Georgantas, Valé...
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
SAS
2009
Springer
147views Formal Methods» more  SAS 2009»
16 years 12 days ago
Polymorphic Fractional Capabilities
Abstract. The capability calculus is a framework for statically reasoning about program resources such as deallocatable memory regions. Fractional capabilities, originally proposed...
Hirotoshi Yasuoka, Tachio Terauchi