Sciweavers

5255 search results - page 263 / 1051
» Formal Methods for Privacy
Sort
View
FMCAD
2004
Springer
15 years 8 months ago
Scalable Automated Verification via Expert-System Guided Transformations
Abstract. Transformation-based verification has been proposed to synergistically leverage various transformations to successively simplify and decompose large problems to ones whic...
Hari Mony, Jason Baumgartner, Viresh Paruthi, Robe...
FMCAD
2006
Springer
15 years 8 months ago
Synchronous Elastic Networks
We formally define--at the stream transformer level--a class of synchronous circuits that tolerate any variability in the latency of their environment. We study behavioral properti...
Sava Krstic, Jordi Cortadella, Michael Kishinevsky...
95
Voted
ZUM
1995
Springer
15 years 8 months ago
Testing as Abstraction
as Abstraction Susan Stepney Logica UK Ltd 1 The PROST-Objects project has developed a method for specifying tests. The method is based on systematic abstraction from a `state-plus...
Susan Stepney
CCS
2009
ACM
15 years 11 months ago
HAIL: a high-availability and integrity layer for cloud storage
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system that allows a set of servers to prove to a client that a stored file is intact and r...
Kevin D. Bowers, Ari Juels, Alina Oprea
CCS
2007
ACM
15 years 10 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...