Sciweavers

76 search results - page 4 / 16
» Compositional Action System Derivation Using Enforced Proper...
Sort
View
74
Voted
GPCE
2008
Springer
14 years 10 months ago
Property models: from incidental algorithms to reusable components
A user interface, such as a dialog, assists a user in synthesising a set of values, typically parameters for a command object. Code for “command parameter synthesis” is usuall...
Jaakko Järvi, Mat Marcus, Sean Parent, John F...
CSFW
1996
IEEE
15 years 1 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
POLICY
2007
Springer
15 years 3 months ago
Specifying and Enforcing High-Level Semantic Obligation Policies
Obligation Policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems...
Zhen Liu, Anand Ranganathan, Anton Riabov
FASE
1998
Springer
15 years 1 months ago
Compositional Verification of Reactive Systems Specified by Graph Transformation
A loose semantics for graph transformation rules which has been developed recently is used in this paper for the compositional verification of specifications. The main conceptual t...
Reiko Heckel
SP
1996
IEEE
116views Security Privacy» more  SP 1996»
15 years 1 months ago
Defining Noninterference in the Temporal Logic of Actions
Covert channels are a critical concern for multilevel secure (MLS) systems. Due to their subtlety, it is desirable to use formal methods to analyze MLS systems for the presence of...
Todd Fine