Sciweavers

181 search results - page 17 / 37
» Automated Verification of UMLsec Models for Security Require...
Sort
View
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 1 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
ER
2008
Springer
136views Database» more  ER 2008»
14 years 11 months ago
Automating the Extraction of Rights and Obligations for Regulatory Compliance
Abstract. Government regulations are increasingly affecting the security, privacy and governance of information systems in the United States, Europe and elsewhere. Consequently, co...
Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breau...
GIS
2008
ACM
14 years 10 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
106
Voted
ATVA
2006
Springer
153views Hardware» more  ATVA 2006»
15 years 1 months ago
Learning-Based Symbolic Assume-Guarantee Reasoning with Automatic Decomposition
Abstract. Compositional reasoning aims to improve scalability of verification tools by reducing the original verification task into subproblems. The simplification is typically bas...
Wonhong Nam, Rajeev Alur
ICSE
2008
IEEE-ACM
15 years 10 months ago
A verification system for timed interval calculus
Timed Interval Calculus (TIC) is a highly expressive set-based notation for specifying and reasoning about embedded real-time systems. However, it lacks mechanical proving support...
Chunqing Chen, Jin Song Dong, Jun Sun 0001