Sciweavers

5255 search results - page 305 / 1051
» Formal Methods for Privacy
Sort
View
CCS
2003
ACM
15 years 10 months ago
Receiver anonymity via incomparable public keys
We describe a new method for protecting the anonymity of message receivers in an untrusted network. Surprisingly, existing methods fail to provide the required level of anonymity ...
Brent R. Waters, Edward W. Felten, Amit Sahai
ICCS
2007
Springer
15 years 10 months ago
Equivalent Semantic Translation from Parallel DEVS Models to Time Automata
Dynamic reconfigurable simulation based on Discrete Event System Specification (DEVS) requires efficient verification of simulation models. Traditional verification method of DEVS ...
Shoupeng Han, Kedi Huang
ICFEM
1998
Springer
15 years 8 months ago
A Process Algebra Based Verification of a Production System
Studying industrial systems by simulation enables the designer to study the dynamic behaviour and to determine some characteristics of the system. Unfortunately, simulation also h...
J. J. T. Kleijn, J. E. Rooda, Michel A. Reniers
DAGSTUHL
2001
15 years 6 months ago
Thinking Tools for the Future of Computing Science
This paper argues that "formal methods" can (continue to) provide the thinking tools for the future of computing science. Every significant engineering or scientific disc...
Cliff B. Jones
DBSEC
1996
125views Database» more  DBSEC 1996»
15 years 6 months ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi