Sciweavers

262 search results - page 47 / 53
» Verifying Web Applications Using Bounded Model Checking
Sort
View
DKE
2008
158views more  DKE 2008»
14 years 9 months ago
Integration and verification of semantic constraints in adaptive process management systems
Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary ...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
CCS
2011
ACM
13 years 9 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
JSS
2006
155views more  JSS 2006»
14 years 9 months ago
Semantic component networking: Toward the synergy of static reuse and dynamic clustering of resources in the knowledge grid
Model is a kind of codified knowledge that has been verified in solving problems. Solving a complex problem usually needs a set of models. Using components, the composition of a s...
Hai Zhuge
80
Voted
PAKDD
2009
ACM
135views Data Mining» more  PAKDD 2009»
15 years 4 months ago
On Mining Rating Dependencies in Online Collaborative Rating Networks
The trend of social information processing sees e-commerce and social web applications increasingly relying on user-generated content, such as rating, to determine the quality of o...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
CSFW
2002
IEEE
15 years 2 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe