Sciweavers

733 search results - page 96 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
CORR
2008
Springer
143views Education» more  CORR 2008»
14 years 12 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
JFP
2007
111views more  JFP 2007»
14 years 11 months ago
Mechanizing metatheory in a logical framework
The LF logical framework codifies a methodology for representing deductive systems, such as programming languages and logics, within a dependently typed λ-calculus. In this meth...
Robert Harper, Daniel R. Licata
OTM
2005
Springer
15 years 5 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
COMCOM
2000
130views more  COMCOM 2000»
14 years 11 months ago
Use Case Maps and LOTOS for the prototyping and validation of a mobile group call system
ABSTRACT -- SPEC-VALUE, a rigorous scenario-driven approach for the description and validation of complex system functionalities at the early stages of design, is presented. It is ...
Daniel Amyot, Luigi Logrippo
ISSTA
1989
ACM
15 years 3 months ago
The Logic of Propagation in the Inscape Environment
The Inscape Environment research project addresses issues in supporting the development of large systems by large numbers of programmers. One aspect of this research is the ‘‘...
D. Perry