Sciweavers

76 search results - page 12 / 16
» Compositional Action System Derivation Using Enforced Proper...
Sort
View
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
15 years 11 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciļ¬...
Anooshiravan Saboori, Christoforos N. Hadjicostis
BIRTHDAY
2004
Springer
15 years 10 months ago
A Trace Semantics for Long-Running Transactions
Abstract. A long-running transaction is an interactive component of a distributed system which must be executed as if it were a single atomic action. In principle, it should not be...
Michael J. Butler, C. A. R. Hoare, Carla Ferreira
185
Voted
CSFW
2010
IEEE
15 years 9 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
CAV
2007
Springer
108views Hardware» more  CAV 2007»
15 years 11 months ago
Systematic Acceleration in Regular Model Checking
Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as finite words over a finite alphabet, where regular ...
Bengt Jonsson, Mayank Saksena
JAR
2008
70views more  JAR 2008»
15 years 5 months ago
Assumption-Commitment Support for CSP Model Checking
We present a simple formulation of Assumption-Commitment reasoning using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form COM SYS A...
Nick Moffat, Michael Goldsmith