Sciweavers

1446 search results - page 153 / 290
» Formal analysis of hardware requirements
Sort
View
91
Voted
CCS
2008
ACM
15 years 2 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
89
Voted
CAV
2009
Springer
155views Hardware» more  CAV 2009»
16 years 1 months ago
Better Quality in Synthesis through Quantitative Objectives
Abstract. Most specification languages express only qualitative constraints. However, among two implementations that satisfy a given specification, one may be preferred to another....
Roderick Bloem, Krishnendu Chatterjee, Thomas A. H...
90
Voted
RV
2007
Springer
74views Hardware» more  RV 2007»
15 years 6 months ago
Rollback Atomicity
We introduce a new non-interference criterion for concurrent programs: rollback atomicity. Similarly to other definitions of atomicity, rollback atomicity of a given concurrent ex...
Serdar Tasiran, Tayfun Elmas
SCS
2003
15 years 2 months ago
Safety Assurance Contracts for Integrated Modular Avionics
This paper describes a method for performing safety analysis on an Integrated Modular Avionics system in a manner which supports the incremental development and change of system c...
Philippa Conmy, Mark Nicholson, John A. McDermid
COMPSAC
2009
IEEE
15 years 7 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz