Sciweavers

262 search results - page 32 / 53
» Verifying Web Applications Using Bounded Model Checking
Sort
View
TPHOL
2009
IEEE
15 years 6 months ago
Let's Get Physical: Models and Methods for Real-World Security Protocols
Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. I...
David A. Basin, Srdjan Capkun, Patrick Schaller, B...
FIDJI
2003
Springer
15 years 4 months ago
Model Generation for Distributed Java Programs
— We present techniques for analyzing the source code of distributed Java applications, and building finite models of their behaviour. The models are labelled transition systems...
Rabéa Boulifa, Eric Madelaine
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
16 years 1 months ago
Simultaneous Equation Systems for Query Processing on Continuous-Time Data Streams
We introduce Pulse, a framework for processing continuous queries over models of continuous-time data, which can compactly and accurately represent many real-world activities and p...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
ACSAC
2010
IEEE
14 years 9 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
APSEC
2006
IEEE
15 years 5 months ago
Adopting Model-Driven Development for Integrated Services and Appliances in Home Network Systems
The technology of a home network system (HNS) allows integration of several kinds of home appliances to provide a user with value-added integrated services. Development of the int...
Hiroshi Igaki, Masahide Nakamura, Ken-ichi Matsumo...