Sciweavers

5255 search results - page 243 / 1051
» Formal Methods for Privacy
Sort
View
TDSC
2008
152views more  TDSC 2008»
15 years 4 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...
SIAMCOMP
2002
90views more  SIAMCOMP 2002»
15 years 3 months ago
A Virtually Synchronous Group Multicast Algorithm for WANs: Formal Approach
This paper presents a formal design for a novel group communication service targeted for WANs. The service provides Virtual Synchrony semantics. Such semantics facilitate the desi...
Idit Keidar, Roger Khazan
143
Voted
JCST
2010
189views more  JCST 2010»
14 years 11 months ago
Formally Analyzing Expected Time Complexity of Algorithms Using Theorem Proving
Probabilistic techniques are widely used in the analysis of algorithms to estimate the computational complexity of algorithms or a computational problem. Traditionally, such analys...
Osman Hasan, Sofiène Tahar
117
Voted
JUCS
2010
106views more  JUCS 2010»
15 years 2 months ago
Situational Method Engineering: State-of-the-Art Review
: The situational method engineering (SME) literature is surveyed and a synoptic evaluation presented in the context of formalizing and regularizing the conceptual framework and un...
Brian Henderson-Sellers, Jolita Ralyté
133
Voted
ISEMANTICS
2010
15 years 5 months ago
STEX+: a system for flexible formalization of linked data
We present the STEX system, a semantic extension of LATEX, that allows for producing high-quality PDF documents for (proof)reading and printing, as well as semantic XML/OMDoc docu...
Andrea Kohlhase, Michael Kohlhase, Christoph Lange...