Sciweavers

746 search results - page 92 / 150
» Formal Analysis of UML-Based Designs
Sort
View
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 7 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
AC
2003
Springer
15 years 5 months ago
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Abstract. Over the last decade there has been a shift from "data-aware" information systems to "process-aware" information systems. To support business processe...
Wil M. P. van der Aalst
CCS
2007
ACM
15 years 8 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
UML
2004
Springer
15 years 7 months ago
Software Architecture Description and UML
The description of software architectures has always been concerned with the definition of the appropriate languages for designing the various architectural artifacts. Over the pa...
Paris Avgeriou, Nicolas Guelfi, Nenad Medvidovic
DLOG
2010
14 years 12 months ago
Checking Full Satisfiability of Conceptual Models
Abstract. UML class diagrams (UCDs) are the de-facto standard formalism for the analysis and design of information systems. By adopting formal language techniques to capture constr...
Alessandro Artale, Diego Calvanese, Yazmin Ang&eac...