Sciweavers

4340 search results - page 153 / 868
» Formal Methods and Cryptography
Sort
View
CAISE
2006
Springer
15 years 7 months ago
From Requirements Models to Formal Specifications in B
Abstract. The development of critical systems requires a high assurance process from requirements to the running code. Formal methods, such as B, now provide industry-strength tool...
Christophe Ponsard, Emmanuel Dieul
DSN
2008
IEEE
15 years 5 months ago
Experiences with formal specification of fault-tolerant file systems
Fault-tolerant, replicated file systems are a crucial component of today's data centers. Despite their huge complexity, these systems are typically specified only in brief pr...
Roxana Geambasu, Andrew Birrell, John MacCormick
CORR
2010
Springer
178views Education» more  CORR 2010»
15 years 4 months ago
Formalization of the data flow diagram rules for consistency check
In system development life cycle (SDLC), a system model can be developed using Data Flow Diagram (DFD). DFD is graphical diagrams for specifying, constructing and visualizing the ...
Rosziati Ibrahim, Siow Yen yen
PKC
2009
Springer
180views Cryptology» more  PKC 2009»
16 years 4 months ago
Security of Sanitizable Signatures Revisited
Sanitizable signature schemes, as defined by Ateniese et al. (ESORICS 2005), allow a signer to partly delegate signing rights to another party, called the sanitizer. That is, the s...
Anja Lehmann, Christina Brzuska, Dominique Schr&ou...
ACSAC
2006
IEEE
15 years 10 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten