Sciweavers

58 search results - page 8 / 12
» Requirement enforcement by transformation automata
Sort
View
HOTOS
2007
IEEE
15 years 1 months ago
End-to-End Web Application Security
Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the ...
Úlfar Erlingsson, V. Benjamin Livshits, Yin...
HYBRID
1998
Springer
15 years 1 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
ENTCS
2006
135views more  ENTCS 2006»
14 years 9 months ago
Coordination Models Based on a Formal Model of Distributed Object Reflection
We propose a family of models of coordination of distributed object systems representing different views, with refinement relations between the different views. We start with dist...
Carolyn L. Talcott
94
Voted
POLICY
2001
Springer
15 years 1 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
ICMT
2009
Springer
15 years 4 months ago
A Simple Game-Theoretic Approach to Checkonly QVT Relations
Abstract. The QVT Relations (QVT-R) transformation language allows the definition of bidirectional model transformations, which are required in cases where a two (or more) models ...
Perdita Stevens