Sciweavers

811 search results - page 120 / 163
» Integrating Formal Description Techniques
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
CCGRID
2002
IEEE
15 years 4 months ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
ECRTS
2000
IEEE
15 years 4 months ago
Towards validated real-time software
We present a tool for the design and validation of embedded real-time applications. The tool integrates two approaches, the use of the synchronous programming language ESTEREL for...
Valérie Bertin, Michel Poize, Jacques Pulou...
WADT
1998
Springer
15 years 4 months ago
Semantic Constructions for Hidden Algebra
Abstract. Hidden algebra is a behavioural algebraic specification formalism for objects. It captures their constructional aspect, concerned with the initialisation and evolution of...
Corina Cîrstea
APCCM
2007
15 years 1 months ago
A Data Quality Metamodel Extension to CWM
The importance of metadata has been broadly referred in the last years, mainly in the field of data warehousing and decision support systems. Contemporarily, in the adjacent field...
Pedro Gomes, José Farinha, Maria José...