Sciweavers

5255 search results - page 262 / 1051
» Formal Methods for Privacy
Sort
View
FBT
1997
15 years 5 months ago
Rapid Prototyping with AutoFocus
Abstract: In most cases, it is simple inconvenience of use that keeps formal methods from being put to industrial use. This paper argues that functionalities, even though of simple...
Franz Huber, Bernhard Schätz
ESORICS
2009
Springer
15 years 8 months ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...
SAS
1993
Springer
126views Formal Methods» more  SAS 1993»
15 years 8 months ago
Finiteness Conditions for Strictness Analysis
We give upper bounds on the number of times the fixed point operator needs to be unfolded for strictness analysis of functional languages with lists. This extends previous work b...
Flemming Nielson, Hanne Riis Nielson
CAISE
2005
Springer
15 years 10 months ago
The Logic of Correctness in Software Engineering
Abstract. This paper uses a framework drawn from work in the philosophy of science to characterize the concepts of program correctness that have been used in software engineering, ...
Mark Priestly
ICFEM
2003
Springer
15 years 9 months ago
A Z Based Approach to Verifying Security Protocols
Abstract. Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be dire...
Benjamin W. Long, Colin J. Fidge, Antonio Cerone