Sciweavers

2043 search results - page 64 / 409
» Reasoning About Security Models
Sort
View
78
Voted
CAV
2003
Springer
116views Hardware» more  CAV 2003»
15 years 5 months ago
Reasoning with Temporal Logic on Truncated Paths
We consider the problem of reasoning with linear temporal logic on truncated paths. A truncated path is a path that is finite, but not necessarily maximal. Truncated paths arise n...
Cindy Eisner, Dana Fisman, John Havlicek, Yoad Lus...
93
Voted
CORR
2004
Springer
111views Education» more  CORR 2004»
15 years 12 days ago
FLUX: A Logic Programming Method for Reasoning Agents
FLUX is a programming method for the design of agents that reason logically about their actions and sensor information in the presence of incomplete knowledge. The core of FLUX is...
Michael Thielscher
76
Voted
ACSAC
2004
IEEE
15 years 4 months ago
Visualizing Enterprise-Wide Security (VIEWS)
This paper discusses VIEWS, a specification for building diagrams that describe the security features of systems. The authors' recent experience with providing security archi...
J. J. Brennan, Mindy Rudell, Donald B. Faatz, Cars...
101
Voted
TLDI
2003
ACM
15 years 5 months ago
The logical approach to stack typing
We develop a logic for reasoning about adjacency and separation of memory blocks, as well as aliasing of pointers. We provide a memory model for our logic and present a sound set ...
Amal J. Ahmed, David Walker
119
Voted
TCS
2008
15 years 14 days ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld