fy and Verify Data Abstractions Luciano Baresi, Carlo Ghezzi, Andrea Mocci and Mattia Monga 14 pages Guest Editors: Claudia Ermel, Reiko Heckel, Juan de Lara Managing Editors: Tizi...
Luciano Baresi, Carlo Ghezzi, Andrea Mocci, Mattia...
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
VCC is an industrial-strength verification environment for low-level concurrent system code written in C. VCC takes a program (annotated with function contracts, state assertions,...
Ernie Cohen, Markus Dahlweid, Mark A. Hillebrand, ...