Sciweavers

624 search results - page 91 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
TASE
2008
IEEE
15 years 6 months ago
ProB gets Nauty: Effective Symmetry Reduction for B and Z Models
Symmetry reduction holds great promise to counter the state explosion problem. However, currently it is “conducting a life on the fringe”, and is not widely applied, mainly du...
Corinna Spermann, Michael Leuschel
OOPSLA
2010
Springer
14 years 10 months ago
Ficticious: MicroLanguages for interactive fiction
In this paper we provide an experience report where language oriented programming approaches are applied to complex game design. Ficticious is a G-expression based pidgin of sever...
James Dean Palmer
ICAI
2008
15 years 1 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
ACSAC
2002
IEEE
15 years 4 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
15 years 8 months ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper