Sciweavers

2043 search results - page 126 / 409
» Reasoning About Security Models
Sort
View
129
Voted
HOTDEP
2008
126views Hardware» more  HOTDEP 2008»
15 years 7 months ago
Toward Quantifying System Manageability
Manageability directly influences a system's reliability, availability, security, and safety, thus being a key ingredient of system dependability. Alas, we do not have today ...
George Candea
IFIP
2009
Springer
15 years 11 months ago
Analysing the Information Flow Properties of Object-Capability Patterns
We consider the problem of detecting covert channels within security-enforcing object-capability patterns. Traditional formalisms for reasoning about the security properties of obj...
Toby C. Murray, Gavin Lowe
154
Voted
GIS
2010
ACM
15 years 3 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
ENTCS
2008
109views more  ENTCS 2008»
15 years 5 months ago
Separation Logic for Multiple Inheritance
As an extension to Floyd-Hoare logic, separation logic has been used to facilitate reasoning about imperative programs manipulating shared mutable data structures. Recently, it ha...
Chenguang Luo, Shengchao Qin
CL
2007
Springer
15 years 5 months ago
A bulk-synchronous parallel process algebra
The CCS (Calculus of Communicating Systems) process algebra is a well-known formal model of synchronization and communication. It is used for the analysis of safety and liveness i...
Armelle Merlin, Gaétan Hains