Sciweavers

5525 search results - page 175 / 1105
» Verification of Model Transformations
Sort
View
97
Voted
PKC
2012
Springer
182views Cryptology» more  PKC 2012»
13 years 6 months ago
From Selective to Full Security: Semi-generic Transformations in the Standard Model
Michel Abdalla, Dario Fiore, Vadim Lyubashevsky
CADE
2007
Springer
16 years 3 months ago
A History-based Verification of Distributed Applications
Safety and security guarantees for individual applications in general depend on assumptions on the given context provided by distributed instances of operating systems, hardware pl...
Bruno Langenstein, Andreas Nonnengart, Georg Rock,...
114
Voted
WETICE
2006
IEEE
15 years 9 months ago
Security Verification Techniques Applied to PatchLink COTS Software
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...