Sciweavers

963 search results - page 81 / 193
» Formal Analysis of BPMN Models Using Event-B
Sort
View
ICSOC
2010
Springer
14 years 12 months ago
A Requirement-Centric Approach to Web Service Modeling, Discovery, and Selection
Service-Oriented Computing (SOC) has gained considerable popularity for implementing Service-Based Applications (SBAs) in a flexible and effective manner. The basic idea of SOC i...
Maha Driss, Naouel Moha, Yassine Jamoussi, Jean-Ma...
ICSE
2009
IEEE-ACM
15 years 8 months ago
Save-IDE - A tool for design, analysis and implementation of component-based embedded systems
The paper presents Save-IDE, an Integrated Development Environment for the development of component-based embedded systems. Save-IDE supports efficient development of dependable ...
Séverine Sentilles, Anders Pettersson, Dag ...
IFIP
2009
Springer
14 years 11 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
ISSTA
1998
ACM
15 years 5 months ago
Improving Efficiency of Symbolic Model Checking for State-Based System Requirements
We present various techniques for improving the time and space efficiency of symbolic model checking for system requirements specified as synchronous finite state machines. We use...
William Chan, Richard J. Anderson, Paul Beame, Dav...
CSFW
2002
IEEE
15 years 6 months ago
Probabilistic Analysis of Anonymity
We present a formal analysis technique for probabilistic security properties of peer-to-peer communication systems based on random message routing among members. The behavior of g...
Vitaly Shmatikov