Sciweavers

274 search results - page 53 / 55
» Formal procedural security modeling and analysis
Sort
View
82
Voted
ISARCS
2010
141views Hardware» more  ISARCS 2010»
15 years 2 months ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
106
Voted
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 2 days ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
92
Voted
BMCBI
2004
228views more  BMCBI 2004»
14 years 10 months ago
An XML standard for the dissemination of annotated 2D gel electrophoresis data complemented with mass spectrometry results
Background: Many proteomics initiatives require a seamless bioinformatics integration of a range of analytical steps between sample collection and systems modeling immediately ass...
Romesh Stanislaus, Liu Hong Jiang, Martha Swartz, ...
118
Voted
POPL
2011
ACM
14 years 1 months ago
Making prophecies with decision predicates
We describe a new algorithm for proving temporal properties expressed in LTL of infinite-state programs. Our approach takes advantage of the fact that LTL properties can often be...
Byron Cook, Eric Koskinen
64
Voted
WWW
2007
ACM
15 years 11 months ago
Compiling cryptographic protocols for deployment on the web
Cryptographic protocols are useful for trust engineering in Web transactions. The Cryptographic Protocol Programming Language (CPPL) provides a model wherein trust management anno...
Jay A. McCarthy, Shriram Krishnamurthi, Joshua D. ...