Sciweavers

624 search results - page 94 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
ZUM
1991
Springer
15 years 3 months ago
The Use of Z
During 1990 and 1991 we carried out a survey of Z users in the UK; in this paper we present the results. Z is being used by a wide variety of companies for many different applicat...
Rosalind Barden, Susan Stepney, David Cooper
FASE
2007
Springer
15 years 6 months ago
Flexible and Extensible Notations for Modeling Languages
Abstract. In model-based development, a formal description of the software (the model) is the central artifact that drives other development activities. The availability of a model...
Jimin Gao, Mats Per Erik Heimdahl, Eric Van Wyk
HOTSWUP
2009
ACM
15 years 4 months ago
Automating Database Schema Evolution in Information System Upgrades
The complexity, cost, and down-time currently created by the database schema evolution process is the source of incessant problems in the life of information systems and a major s...
Carlo Curino, Hyun Jin Moon, Carlo Zaniolo
CCS
2008
ACM
15 years 1 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CCS
2009
ACM
15 years 3 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...