ā Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciļ¬...
Abstract. A long-running transaction is an interactive component of a distributed system which must be executed as if it were a single atomic action. In principle, it should not be...
āAuthorization logics allow concise speciļ¬cation of ļ¬exible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as ļ¬nite words over a ļ¬nite alphabet, where regular ...
We present a simple formulation of Assumption-Commitment reasoning using CSP. In our formulation, an assumption-commitment style property of a process SYS takes the form COM SYS A...