Sciweavers

1522 search results - page 10 / 305
» Practical Exception Specifications
Sort
View
IFM
2009
Springer
183views Formal Methods» more  IFM 2009»
14 years 7 months ago
Challenges in the Specification of Full Contracts
Abstract. The complete specification of full contracts -- contracts which include tolerated exceptions, and which enable reasoning about the contracts themselves, can be achieved u...
Gordon J. Pace, Gerardo Schneider
PODC
1996
ACM
15 years 1 months ago
Fail-Awareness in Timed Asynchronous Systems
We address the problem of the impossibility of implementing synchronous fault-tolerant service specifications in asynchronous distributed systems. We introduce a method for weaken...
Christof Fetzer, Flaviu Cristian
SIN
2010
ACM
14 years 7 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
14 years 9 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
ICSE
2004
IEEE-ACM
15 years 9 months ago
Component-Based Self-Adaptability in Peer-to-Peer Architectures
Current peer-to-peer architectures are hardly resistant against unanticipated exceptions such as the failure of single peers. This can be justified by the absence of sophisticated...
Sascha Alda