Sciweavers

4036 search results - page 46 / 808
» Formal Methods
Sort
View
110
Voted
ITRUST
2004
Springer
15 years 7 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
CN
2002
102views more  CN 2002»
15 years 2 months ago
Formal methods for communication services: meeting the industry expectations
We survey formal methods as they are applied to the development of communication services. We report on industrial and academic projects, consider di erent communication architect...
Falk Dietrich, Jean-Pierre Hubaux
ATAL
2004
Springer
15 years 7 months ago
The Insufficiency of Formal Design Methods - The Necessity of an Experimental Approach - for the Understanding and Control of Co
We highlight the limitations of formal methods by exhibiting two results in recursive function theory: that there is no effective means of finding a program that satisfies a given...
Bruce Edmonds, Joanna Bryson
ZUM
2000
Springer
15 years 6 months ago
Formal Methods for Industrial Products
We have recently completed the specication and security proof of a large, industrial scale application. The application is security critical, and the modelling and proof were done ...
Susan Stepney, David Cooper
136
Voted
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 6 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner