Sciweavers

1078 search results - page 57 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
JFP
2008
125views more  JFP 2008»
14 years 11 months ago
Types and trace effects of higher order programs
This paper shows how type effect systems can be combined with model-checking techniques to produce powerful, automatically verifiable program logics for higher order programs. The...
Christian Skalka, Scott F. Smith, David Van Horn
SPIN
2009
Springer
15 years 6 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
EUSFLAT
2009
134views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Flow Line Systems with Possibilistic Data: a System with Waiting Time in Line Uncertain
This paper proposes to analyze two flow line systems in which we include possibilistic data -the priority-discipline is possibilistic instead of probabilistic- and measure the perf...
David de la Fuente, María José Pardo
JPDC
2008
132views more  JPDC 2008»
14 years 11 months ago
Assurance of dynamic adaptation in distributed systems
Long running applications often need to adapt due to changing requirements or changing environment. Typically, such adaptation is performed by dynamically adding or removing compo...
Karun N. Biyani, Sandeep S. Kulkarni
STTT
2008
134views more  STTT 2008»
14 years 11 months ago
Automated verification of access control policies using a SAT solver
Abstract. Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended cons...
Graham Hughes, Tevfik Bultan