Sciweavers

2137 search results - page 195 / 428
» Proving Abstract Non-interference
Sort
View
FM
2005
Springer
112views Formal Methods» more  FM 2005»
15 years 8 months ago
Dynamic Component Substitutability Analysis
This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two techniq...
Natasha Sharygina, Sagar Chaki, Edmund M. Clarke, ...
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 8 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...
FSTTCS
2005
Springer
15 years 8 months ago
Market Equilibrium for CES Exchange Economies: Existence, Multiplicity, and Computation
Abstract. We consider exchange economies where the traders’ preferences are expressed in terms of the extensively used constant elasticity of substitution (CES) utility functions...
Bruno Codenotti, Benton McCune, Sriram Penumatcha,...
HYBRID
2005
Springer
15 years 8 months ago
Primal-Dual Tests for Safety and Reachability
Abstract. A methodology for safety verification using barrier certificates has been proposed recently. Conditions that must be satisfied by a barrier certificate can be formula...
Stephen Prajna, Anders Rantzer
ICALP
2005
Springer
15 years 8 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...