Abstract. Regular model checking is a form of symbolic model checking technique for systems whose states can be represented as finite words over a finite alphabet, where regular ...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
In this paper we continue the study of a strict extension of the Computation Tree Logic, called graded-CTL, recently introduced by the same authors. This new logic augments the sta...
The reengineering of legacy software systems to modern Object Oriented platforms has received significant attention over the past few years. However, most often the reengineering ...
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...