Sciweavers

1895 search results - page 85 / 379
» Using ATL for Checking Models
Sort
View
IFIP
2009
Springer
15 years 2 months ago
Model Checking of Security-Sensitive Business Processes
Security-sensitive business processes are business processes that must comply with security requirements (e.g. authorization constraints). In previous works it has been shown that ...
Alessandro Armando, Serena Elisa Ponta
CAV
2006
Springer
120views Hardware» more  CAV 2006»
15 years 8 months ago
Model Checking Multithreaded Programs with Asynchronous Atomic Methods
Abstract. In order to make multithreaded programming manageable, programmers often follow a design principle where they break the problem into tasks which are then solved asynchron...
Koushik Sen, Mahesh Viswanathan
QSIC
2007
IEEE
15 years 11 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
TACAS
2005
Springer
112views Algorithms» more  TACAS 2005»
15 years 10 months ago
Truly On-the-Fly LTL Model Checking
Abstract. We propose a novel algorithm for automata-based LTL model checking that interleaves the construction of the generalized B¨uchi automaton for the negation of the formula ...
Moritz Hammer, Alexander Knapp, Stephan Merz
ITA
2007
15 years 4 months ago
Three notes on the complexity of model checking fixpoint logic with chop
Abstract. This paper analyses the complexity of model checking Fixpoint Logic with Chop – an extension of the modal µ-calculus with a sequential composition operator. It uses tw...
Martin Lange