Sciweavers

286 search results - page 33 / 58
» Pitfalls in Formal Reasoning about Security Protocols
Sort
View
CAV
1993
Springer
108views Hardware» more  CAV 1993»
15 years 1 months ago
Computer-Assisted Simulation Proofs
Abstract. This paper presents a scalable approach to reasoning formally about distributed algorithms. It uses results about I O automata to extract a set of proof obligations for s...
Jørgen F. Søgaard-Andersen, Stephen ...
83
Voted
ESAW
2006
Springer
15 years 1 months ago
Using Constraints and Process Algebra for Specification of First-Class Agent Interaction Protocols
Abstract. Current approaches to multi-agent interaction involve specifying protocols as sets of possible interactions, and hard-coding decision mechanisms into agent programs in or...
Tim Miller, Peter McBurney
100
Voted
JODS
2007
138views Data Mining» more  JODS 2007»
14 years 9 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
OOPSLA
2007
Springer
15 years 3 months ago
Modular typestate checking of aliased objects
Objects often define usage protocols that clients must follow in order for these objects to work properly. Aliasing makes it notoriously difficult to check whether clients and i...
Kevin Bierhoff, Jonathan Aldrich
CSFW
2005
IEEE
15 years 3 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers