Sciweavers

5255 search results - page 223 / 1051
» Formal Methods for Privacy
Sort
View
ICFEM
2007
Springer
15 years 10 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald
ISOLA
2004
Springer
15 years 9 months ago
A Formal Analysis of Bluetooth Device Discovery
Abstract. This paper presents a formal analysis of the device discovery phase of the Bluetooth wireless communication protocol. The performance of this process is the result of a c...
Marie Duflot, Marta Z. Kwiatkowska, Gethin Norman,...
135
Voted
ECBS
2003
IEEE
115views Hardware» more  ECBS 2003»
15 years 9 months ago
Details of Formalized Relations in Feature Models Using OCL
System families are a form of high level reuse of development assets in a specific problem domain, by making use of commonalities and variabilities. To represent assets belonging ...
Detlef Streitferdt, Matthias Riebisch, Ilka Philip...
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
15 years 8 months ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet
ISIM
2007
15 years 5 months ago
Formal Computation Independent Model of the Problem Domain within the MDA
The proposed approach called Topological Functioning Modeling for Model Driven Architecture (TFMfMDA) uses formal mathematical foundations of Topological Functioning Model. It intr...
Janis Osis, Erika Asnina, Andrejs Grave