Sciweavers

837 search results - page 92 / 168
» Proof Development with OMEGA
Sort
View
EEE
2005
IEEE
15 years 10 months ago
Service Composition in a Secure Agent-Based Architecture
We describe an agent-based situation-aware survivable architecture for the discovery and composition of web services. Our architecture provides for proofs that guaranteethe consis...
Ramesh Bharadwaj, Supratik Mukhopadhyay, Nilay Pad...
ITCC
2005
IEEE
15 years 10 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
ESOP
2005
Springer
15 years 10 months ago
Denotational Semantics for Abadi and Leino's Logic of Objects
Abadi-Leino Logic is a Hoare-calculus style logic for a simple imperative and object-based language where every object comes with its own method suite. Consequently, methods need t...
Bernhard Reus, Jan Schwinghammer
124
Voted
IH
2005
Springer
15 years 10 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
LPAR
2005
Springer
15 years 10 months ago
Termination of Fair Computations in Term Rewriting
Abstract. The main goal of this paper is to apply rewriting termination technology —enjoying a quite mature set of termination results and tools— to the problem of proving auto...
Salvador Lucas, José Meseguer