Sciweavers

1472 search results - page 238 / 295
» On Model Checking Infinite-State Systems
Sort
View
FOSSACS
2005
Springer
15 years 7 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
HICSS
2003
IEEE
112views Biometrics» more  HICSS 2003»
15 years 7 months ago
Assessments of Usability Engineering Processes: Experiences from Experiments
We carried out eight assessments of usability engineering processes in four industrial companies, for the purpose of providing a basis for process improvement. The research method...
Timo Jokela
TIME
2003
IEEE
15 years 7 months ago
Hybrid Logics on Linear Structures: Expressivity and Complexity
We investigate expressivity and complexity of hybrid logics on linear structures. Hybrid logics are an enrichment of modal logics with certain first-order features which are algo...
Massimo Franceschet, Maarten de Rijke, Bernd-Holge...
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 7 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
AGP
2010
IEEE
15 years 5 months ago
The Transformational Approach to Program Development
We present an overview of the program transformation techniques which have been proposed over the past twenty-five years in the context of logic programming. We consider the appro...
Alberto Pettorossi, Maurizio Proietti, Valerio Sen...