Sciweavers

2514 search results - page 32 / 503
» The use of industrial-strength formal methods
Sort
View
ACSAC
1996
IEEE
15 years 6 months ago
Formal Techniques for an ITSEC-E4 Secure Gateway
In this paper we describe the method used to develop a gateway capable of meeting the ITSEC E4 requirements. The security policy was formally modelled and proven consistent with t...
Pierre Bieber
ASWEC
2000
IEEE
15 years 6 months ago
Formal Requirements Engineering: Learning from the Students
Formal methods are becoming increasingly important in many areas of software development and should be incorporated in the teaching of software engineering. Requirements capture i...
J. Paul Gibson
MPC
1998
Springer
140views Mathematics» more  MPC 1998»
15 years 6 months ago
A Set-Theoretic Model for Real-Time Specification and Reasoning
Timed-trace formalisms have emerged as a powerful method for specifying and reasoning about concurrent real-time systems. We present a simple variant which builds methodically on s...
Colin J. Fidge, Ian J. Hayes, A. P. Martin, Axel W...
IJIT
2004
15 years 3 months ago
Formal Verification of a Multicast Protocol In Mobile Networks
As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
Mohammad Reza Matash Borujerdi, S. M. Mirzababaei
ESORICS
2004
Springer
15 years 7 months ago
A Formalization of Anonymity and Onion Routing
The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goa...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink