Sciweavers

288 search results - page 44 / 58
» Formal Analysis of Workflow Systems with Security Considerat...
Sort
View
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
ATVA
2007
Springer
115views Hardware» more  ATVA 2007»
15 years 3 months ago
A Compositional Semantics for Dynamic Fault Trees in Terms of Interactive Markov Chains
Abstract. Dynamic fault trees (DFTs) are a versatile and common formalism to model and analyze the reliability of computer-based systems. This paper presents a formal semantics of ...
Hichem Boudali, Pepijn Crouzen, Mariëlle Stoe...
APN
2006
Springer
15 years 1 months ago
On the Integration of UML and Petri Nets in Software Development
Abstract. Software performance engineering deals with the consideration of quantitative analysis of the behaviour of software systems from the early development phases in the life ...
Javier Campos, José Merseguer
WPES
2005
ACM
15 years 3 months ago
Mining rule semantics to understand legislative compliance
Organizations in privacy-regulated industries (e.g. healthcare and financial institutions) face significant challenges when developing policies and systems that are properly align...
Travis D. Breaux, Annie I. Antón
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 1 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song