Sciweavers

1268 search results - page 148 / 254
» Verifying distributed systems: the operational approach
Sort
View
SIGOPSE
1998
ACM
15 years 2 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
ICDT
2009
ACM
248views Database» more  ICDT 2009»
15 years 10 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
POPL
2008
ACM
15 years 10 months ago
Cyclic proofs of program termination in separation logic
We propose a novel approach to proving the termination of heapmanipulating programs, which combines separation logic with cyclic proof within a Hoare-style proof system. Judgement...
James Brotherston, Richard Bornat, Cristiano Calca...
CCS
2011
ACM
13 years 10 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
DASFAA
2009
IEEE
147views Database» more  DASFAA 2009»
15 years 4 months ago
"Pay-as-You-Go" Processing for Tracing Queries in a P2P Record Exchange System
In recent years, data provenance or lineage tracing which refers to the process of tracing the sources of data, data movement between databases, and annotations written for data ha...
Fengrong Li, Takuya Iida, Yoshiharu Ishikawa