Abstract. To produce a program guaranteed to satisfy a given specification one can synthesize it from a formal constructive proof that a computation satisfying that specification...
Mark Bickford, Robert L. Constable, Joseph Y. Halp...
An exciting trend in enterprise computing lies in the integration of applications across an organisation and even between organisations. This allows the provision of services by a...
Alan Fekete, Paul Greenfield, Dean Kuo, Julian Jan...
An existing distributed lift system was analyzed using the process algebraic language µCRL [7]. Four problems were found, three of which were also found independently by the devel...
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...