Sciweavers

1108 search results - page 106 / 222
» Model Checking of Safety Properties
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 7 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
FMCAD
2008
Springer
15 years 2 months ago
Automatic Non-Interference Lemmas for Parameterized Model Checking
Parameterized model checking refers to any method that extends traditional, finite-state model checking to handle systems arbitrary number of processes. One popular approach to thi...
Jesse D. Bingham
ICWE
2007
Springer
15 years 6 months ago
On the Quality of Navigation Models with Content-Modification Operations
Initially, web development methods focused on the generation of read-only web applications for browsing the data stored in relational database systems. Lately, many have evolved to...
Jordi Cabot, Jordi Ceballos, Cristina Gómez
USS
2010
14 years 10 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
110
Voted
ENTCS
2008
103views more  ENTCS 2008»
15 years 24 days ago
Distributed Markovian Bisimulation Reduction aimed at CSL Model Checking
The verification of quantitative aspects like performance and dependability by means of model checking has become an important and vivid area of research over the past decade. An ...
Stefan Blom, Boudewijn R. Haverkort, Matthias Kunt...