The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
This paper discusses the use of formal methods in testing of concurrent systems. It is argued that formal methods and testing can be mutually profitable and useful. A framework fo...
Guidelines (Extended abstract) Ruud Stegers1 , Annette ten Teije1 , and Frank van Harmelen1 Vrije Universiteit, Amsterdam The main problem encountered when starting verification of...
Ruud Stegers, Annette ten Teije, Frank van Harmele...
This paper discusses a known-plaintext attack on a redundancy reducing cipher method which is proposed by Wayner. We also propose an extension of Wayner's redundancy reducing ...
We present a method for representing and reasoning with uncertainty in RDF(S) and OWL ontologies based on Bayesian networks. Categories and Subject Descriptors: I.2.4 Artificial I...