Sciweavers

2043 search results - page 126 / 409
» Reasoning About Security Models
Sort
View
80
Voted
HOTDEP
2008
126views Hardware» more  HOTDEP 2008»
15 years 3 months ago
Toward Quantifying System Manageability
Manageability directly influences a system's reliability, availability, security, and safety, thus being a key ingredient of system dependability. Alas, we do not have today ...
George Candea
95
Voted
IFIP
2009
Springer
15 years 7 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe
107
Voted
GIS
2010
ACM
14 years 10 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
ENTCS
2008
109views more  ENTCS 2008»
15 years 24 days ago
Separation Logic for Multiple Inheritance
As an extension to Floyd-Hoare logic, separation logic has been used to facilitate reasoning about imperative programs manipulating shared mutable data structures. Recently, it ha...
Chenguang Luo, Shengchao Qin
133
Voted
CL
2007
Springer
15 years 22 days ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains