Sciweavers

3573 search results - page 318 / 715
» Reasoning about Codata
Sort
View
ICSE
2003
IEEE-ACM
16 years 5 months ago
A Compositional Formalization of Connector Wrappers
Increasingly systems are composed of parts: software components, and the interaction mechanisms (connectors) that enable them to communicate. When assembling systems from independ...
Bridget Spitznagel, David Garlan
ICSE
2003
IEEE-ACM
16 years 5 months ago
A Model and a Design Approach to Building QoS Adaptive Systems
The paper introduces a system model called the probabilistic asynchronous model which characterises the context in which many practical and the Internet-based applications are bui...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
ICSE
2007
IEEE-ACM
16 years 5 months ago
Ownership and Immutability Inference for UML-Based Object Access Control
We propose a mechanism for object access control which is based on the UML. Specifically, we propose use of ownership and immutability constraints on UML associations and verifica...
Yin Liu, Ana Milanova
ICFP
2006
ACM
16 years 4 months ago
Polymorphism and separation in hoare type theory
In previous work, we proposed a Hoare Type Theory (HTT) which combines effectful higher-order functions, dependent types and Hoare Logic specifications into a unified framework. H...
Aleksandar Nanevski, Greg Morrisett, Lars Birkedal
ESORICS
2002
Springer
16 years 4 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti