Sciweavers

1268 search results - page 4 / 254
» Verifying distributed systems: the operational approach
Sort
View
IPPS
2003
IEEE
13 years 11 months ago
So Many States, So Little Time: Verifying Memory Coherence in the Cray X1
This paper investigates a complexity-effective technique for verifying a highly distributed directory-based cache coherence protocol. We develop a novel approach called “witnes...
Dennis Abts, Steve Scott, David J. Lilja
USS
2008
13 years 8 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
EDOC
2006
IEEE
14 years 10 days ago
Business Continuity Model. Regeneration System for Manufacturing Components
At present, with the expansion of information technologies at the industry, it is vital to implant proactive, self-managed systems that ensure continuous operation and, therefore,...
Diego Marcos-Jorquera, Francisco Maciá P&ea...
CBSE
2011
Springer
12 years 6 months ago
Automating information flow control in component-based distributed systems
Automating the construction of secure distributed systems becomes necessary. Indeed, developing security code requires a deep expertise and verifying that the developed code respe...
Takoua Abdellatif, Lilia Sfaxi, Riadh Robbana, Yas...
SIGOPSE
2004
ACM
13 years 11 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase