Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
We develop a framework for specifying and reasoning about policies for sharing resources in coalitions, focussing here on a particular, common type of contract in which coalition ...
Babak Sadighi Firozabadi, Marek J. Sergot, Anna Ci...
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Organizational processes often take place over long periods of time and require intermittent attention. Remembering and reasoning about upcoming process tasks is important, but no...
Robert Farrell, Hina Shah, Thomas Erickson, Wendy ...
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...