Sciweavers

189 search results - page 25 / 38
» Model Checking Correctness Properties of Electronic Contract...
Sort
View
CADE
2008
Springer
16 years 2 days ago
Exploring Model-Based Development for the Verification of Real-Time Java Code
Many safety- and security-critical systems are real-time systems and, as a result, tools and techniques for verifying real-time systems are extremely important. Simulation and test...
Niusha Hakimipour, Paul A. Strooper, Roger Duke
FORTE
2003
15 years 1 months ago
A Lightweight Formal Analysis of a Multicast Key Management Scheme
Abstract. This paper describes the analysis of Pull-Based Asynchronous Rekeying Framework (ARF), a recently proposed solution to the scalable group key management problem in secure...
Mana Taghdiri, Daniel Jackson
IJNSEC
2008
190views more  IJNSEC 2008»
14 years 11 months ago
Probabilistic Analysis and Verification of the ASW Protocol using PRISM
The ASW protocol is one of the prominent optimistic fair exchange protocols that is used for contract signing between two participants, the originator and the responder, with the ...
Salekul Islam, Mohammad Abu Zaid
ACL2
2006
ACM
15 years 3 months ago
Combining ACL2 and an automated verification tool to verify a multiplier
We have extended the ACL2 theorem prover to automatically prove properties of VHDL circuits with IBM's Internal SixthSense verification system. We have used this extension to...
Erik Reeber, Jun Sawada
UML
2005
Springer
15 years 5 months ago
Simplifying Autonomic Enterprise Java Bean Applications Via Model-Driven Development: A Case Study
Autonomic computer systems aim to reduce the configuration, operational, and maintenance costs of distributed applications by enabling them to self-manage, self-heal, self-optimiz...
Jules White, Douglas C. Schmidt, Aniruddha S. Gokh...