Sciweavers

733 search results - page 129 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
SLP
1994
77views more  SLP 1994»
15 years 1 months ago
Modal Event Calculus
We consider a hierarchy of modal event calculi to represent and reason about partially ordered events. These calculi are based on the model of time and change of Kowalski and Sergo...
Iliano Cervesato, Luca Chittaro, Angelo Montanari
ARTMED
2006
70views more  ARTMED 2006»
14 years 11 months ago
Towards a comprehensive treatment of repetitions, periodicity and temporal constraints in clinical guidelines
Temporal constraints play a fundamental role in clinical guidelines. For example, temporal indeterminacy, constraints about duration, delays between actions, and periodic repetiti...
Luca Anselma, Paolo Terenziani, Stefania Montani, ...
TOPLAS
2002
98views more  TOPLAS 2002»
14 years 11 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
RTA
2009
Springer
15 years 6 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
JUCS
2008
113views more  JUCS 2008»
14 years 11 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella