Sciweavers

3573 search results - page 266 / 715
» Reasoning about Codata
Sort
View
CSFW
1997
IEEE
15 years 8 months ago
Verifying authentication protocols with CSP
This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes (CSP). It is illustrated by ...
Steve Schneider
AUSAI
1997
Springer
15 years 8 months ago
On the Relation between Interpreted Systems and Kripke Models
Abstract. We compare Kripke models and hypercube systems, a simpli ed notion of Interpreted Systems, as semantic structures for reasoning about knowledge. Our method is to de ne a ...
Alessio Lomuscio, Mark Ryan
117
Voted
WETICE
1996
IEEE
15 years 8 months ago
An enterprise assurance framework
This paper explores generating and conveying confidence in enterprise security. An enterprise assurance framework provides a structure enterprise assurance evidence that strengthe...
Douglas J. Landoll, Jeffrey R. Williams
KI
1997
Springer
15 years 8 months ago
Agents in Proactive Environments
Abstract. Agents situated in proactive environments are acting autonomously while the environment is evolving alongside, whether or not the agents carry out any particular actions....
Dov M. Gabbay, Rolf Nossum, Michael Thielscher
CHARME
1993
Springer
68views Hardware» more  CHARME 1993»
15 years 8 months ago
Temporal Analysis of Time Bounded Digital Systems
To perform veri cation of digital systems with time bounded delays, it is essential to characterize the space of all possible system behaviors. In this paper, we describe our analy...
Alan R. Martello, Steven P. Levitan