Sciweavers

1728 search results - page 113 / 346
» Formal Modeling of Process Migration
Sort
View
ICSE
2004
IEEE-ACM
15 years 11 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
DATE
2005
IEEE
144views Hardware» more  DATE 2005»
15 years 4 months ago
Context Sensitive Performance Analysis of Automotive Applications
Accurate timing analysis is key to efficient embedded system synthesis and integration. While industrial control software systems are developed using graphical models, such as Ma...
Jan Staschulat, Rolf Ernst, Andreas Schulze, Fabia...
TPHOL
2005
IEEE
15 years 4 months ago
On the Correctness of Operating System Kernels
The Verisoft project aims at the pervasive formal verification of entire computer systems. In particular, the seamless verification of the academic system is attempted. This syst...
Mauro Gargano, Mark A. Hillebrand, Dirk Leinenbach...
DBSEC
1996
125views Database» more  DBSEC 1996»
15 years 14 days ago
A Framework for High Assurance Security of Distributed Objects
High assurance security is di cult to achieve in distributed computer systems and databases because of their complexity, non-determinism and inherent heterogeneity. The practical ...
John Hale, Jody Threet, Sujeet Shenoi
79
Voted
ENTCS
2008
64views more  ENTCS 2008»
14 years 11 months ago
Service Discovery and Negotiation With COWS
To provide formal foundations to current (web) services technologies, we put forward using COWS, a process calculus for specifying, combining and analysing services, as a uniform ...
Alessandro Lapadula, Rosario Pugliese, Francesco T...