Sciweavers

5255 search results - page 265 / 1051
» Formal Methods for Privacy
Sort
View
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 4 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
MOC
2010
14 years 11 months ago
Analysis of spectral approximations using prolate spheroidal wave functions
Abstract. In this paper, the approximation properties of the prolate spheroidal wave functions of order zero (PSWFs) are studied, and a set of optimal error estimates are derived f...
Li-lian Wang
ZUM
2000
Springer
107views Formal Methods» more  ZUM 2000»
15 years 8 months ago
How to Drive a B Machine
The B-Method is a state-based formal method that describes behaviour in terms of MACHINES whose states change under OPERATIONS. The process algebra CSP is an event-based formalism ...
Helen Treharne, Steve Schneider
ESORICS
2011
Springer
14 years 4 months ago
Protecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a...
Yuchen Zhou, David Evans
KCAP
2005
ACM
15 years 10 months ago
Knowledge transformations between frame systems and RDB systems
For decades, researchers in knowledge representation (KR) have argued for and against various choices in KR formalisms, such as Rules, Frames, Semantic nets, and Formal logic. In ...
John H. Gennari, Peter Mork, Hao Li