This paper presents a method and concepts of a supporting tool for rapid prototyping of large-scale business information systems. Our method is based on the following guidelines: (...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
—Conventional testing methods often fail to detect hidden flaws in complex embedded software such as device drivers or file systems. This deficiency incurs significant developmen...
Abstract. We extend the automata-theoretic framework for reasoning about infinitestate sequential systems to handle also the global model-checking problem. Our framework is based o...
Specification and verification of real-time systems are important research topics which have practical implications. In this work, we present a self-contained toolkit to analyze r...