Sciweavers

4693 search results - page 39 / 939
» Verifying Hybrid Systems
Sort
View
82
Voted
ECEASST
2008
79views more  ECEASST 2008»
15 years 17 days ago
Using Graph Transformation Systems to Specify and Verify Data Abstractions
fy and Verify Data Abstractions Luciano Baresi, Carlo Ghezzi, Andrea Mocci and Mattia Monga 14 pages Guest Editors: Claudia Ermel, Reiko Heckel, Juan de Lara Managing Editors: Tizi...
Luciano Baresi, Carlo Ghezzi, Andrea Mocci, Mattia...
121
Voted
ACSAC
2009
IEEE
15 years 4 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
101
Voted
ESORICS
2010
Springer
15 years 1 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan
84
Voted
CCS
2010
ACM
15 years 21 days ago
On verifying stateful dataflow processing services in large-scale cloud systems
Cloud computing needs to provide integrity assurance in order to support security sensitive application services such as critical dataflow processing. In this paper, we present a ...
Juan Du, Xiaohui Gu, Ting Yu
80
Voted
TPHOL
2009
IEEE
15 years 7 months ago
VCC: A Practical System for Verifying Concurrent C
VCC is an industrial-strength verification environment for low-level concurrent system code written in C. VCC takes a program (annotated with function contracts, state assertions,...
Ernie Cohen, Markus Dahlweid, Mark A. Hillebrand, ...