Sciweavers

1129 search results - page 158 / 226
» Formal Verification of Websites
Sort
View
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
15 years 3 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
FMOODS
2006
15 years 3 months ago
Defining Object-Oriented Execution Semantics Using Graph Transformations
In this paper we describe an application of the theory of graph transformations to the practise of language design. In particular, we have defined the static and dynamic semantics ...
Harmen Kastenberg, Anneke Kleppe, Arend Rensink
ROOM
2000
15 years 3 months ago
Statecharts as Protocols for Objects
For the specification of object-oriented systems, usually several models representing different views are developed. The necessary integration of views is often delayed until impl...
Annette Laue, Matthias Liedtke, Daniel Moldt, Ivan...
ROOM
2000
15 years 3 months ago
On the Compositional Properties of UML Statechart Diagrams
This paper proposes a revised semantic interpretation of UML Statechart Diagrams which ensures, under the specified design rules, that Statecharts may be constructed to have true ...
Anthony J. H. Simons
ESORICS
2010
Springer
15 years 3 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan