Results 1 - 10
of
133
Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques
, 2000
"... . Workflow management systems facilitate the everyday operation of business processes by taking care of the logistic control of work. In contrast to traditional information systems, they attempt to support frequent changes of the workflows at hand. Therefore, the need for analysis methods to veri ..."
Abstract
-
Cited by 88 (10 self)
- Add to MetaCart
. Workflow management systems facilitate the everyday operation of business processes by taking care of the logistic control of work. In contrast to traditional information systems, they attempt to support frequent changes of the workflows at hand. Therefore, the need for analysis methods
A Design and Verification Framework for Service Composition in the Cloud
"... Abstract—The service cloud model allows hosted services to be dynamically provisioned and composed as part of larger, more complex cloud applications. Compatibility of interaction and quality of service are important to provisioning similar services available in the cloud to a client request. Auditi ..."
Abstract
- Add to MetaCart
to the composition since sensitive data may be leaked if information flow control guarantees cannot be proven. Service engineering lacks design principles and an expression infrastructure for formal representation and reasoning within a service cloud model. Reasoning over service compositions requires a formal
Monitoring and Management Informatization Framework in China: Design, Verification, and
"... Land desertification is the world's most serious environmental problems. As the only country which regularly carried out state-level desertification and sandification monitoring in the world, China had fulfilled out four consecutive desertification and sandification monitoring and accumulated a ..."
Abstract
- Add to MetaCart
C/S and B/S architecture and integrated 2D and 3D system was implemented as a science, efficient and practical information platform for national, provincial, county and other monitoring and management departments. And then, based on the actual verification of the informatization framework
Security and Privacy Requirements Analysis within a Social Setting
- In Proc. of RE’03
, 2003
"... Security issues for software systems ultimately concern relationships among social actors-stakeholders, system users, potential attackers- and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent- ..."
Abstract
-
Cited by 139 (19 self)
- Add to MetaCart
involving security and privacy concerns in the design of agentbased health information systems. In addition, we discuss model evaluation techniques, including qualitative goal model analysis and property verification techniques based on model checking. 1.
User verification in a BioVXML framework
"... BioVXML is designed for creating modules of biometric verification while maintaining all the features and capabilities of the original VoiceXML. The user verification can now be performed by processing different biometric traits, such as speech or face, and these features gives us an assurance of th ..."
Abstract
- Add to MetaCart
of the user identity, whereas traditional methods such as written passwords do not. BioVXML provides facilities to develop any monomodal or multimodal biometric recognition system, and it simplifies the creation of remote access control to information systems. We also show how BioVXML can be used in a
User verification in a BioVXML framework
, 2004
"... We present BioVXML as an extension of the Voice Extensible Markup Language (VoiceXML). BioVXML is designed for creating modules of biometric verification while maintaining all the features and capabilities of the original VoiceXML. The user verification can now be performed by processing different b ..."
Abstract
- Add to MetaCart
access control to information systems. We also show how BioVXML can be used in a practical system like an e-learning platform. 1.
Verification and Validation of Control Algorithms by Coupling of Interpreted Petri Nets
- IEEE conference on Systems Man and Cybernetics, IEEE SMC'98
, 1998
"... Interpreted Petri Nets (IPNs) are an extension of the basic Petri Net (PN) framework. They are ordinary PNs with additional components to model the information flow to and from the PN. This contribution gives a general overview of the control design process. Furthermore, it shows how the different t ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
Interpreted Petri Nets (IPNs) are an extension of the basic Petri Net (PN) framework. They are ordinary PNs with additional components to model the information flow to and from the PN. This contribution gives a general overview of the control design process. Furthermore, it shows how the different
Toward a Security Domain Model for Static Analysis and Verification of Information Systems
"... Abstract. Evaluation of high assurance secure computer systems requires that they be designed, developed, verified and tested using rigorous processes and formal methods. The evaluation process must include correspondence between security policy objectives, security specifications, and program imple ..."
Abstract
-
Cited by 4 (3 self)
- Add to MetaCart
implementation. This research presents an approach to the verification of programs represented in a specialized Implementation Modeling Language (IML) using a formal security Domain Model (DM). The DM is comprised of an invariant part, which defines the generic concepts of program state, information flow
Runtime verification of authorization hook placement for the Linux security modules framework
- In Proceedings of the 9th ACM Conference on Computer and Communications Security
, 2002
"... We present runtime tools to assist the Linux community in verifying the correctness of the Linux Security Modules (LSM) framework. The LSM framework consists of a set of authorization hooks inserted into the Linux kernel to enable additional authorizations to be performed (e.g., for mandatory access ..."
Abstract
-
Cited by 14 (4 self)
- Add to MetaCart
We present runtime tools to assist the Linux community in verifying the correctness of the Linux Security Modules (LSM) framework. The LSM framework consists of a set of authorization hooks inserted into the Linux kernel to enable additional authorizations to be performed (e.g., for mandatory
SPECIFICATION, DESIGN AND VERIFICATION OF DISTRIBUTED EMBEDDED SYSTEMS AFOSR GRANT FA9550-06-1-0303
, 2011
"... Abstract We are investigating the specification, design and verification of distributed systems that combine communications, computation and control in dynamic, uncertain and adversarial en-vironments. Our goal is to develop methods and tools for designing control policies, specifying the properties ..."
Abstract
- Add to MetaCart
, development of a framework to reason about information flow in terms of partially ordered sets (posets) and the development of a compositional framework for programming stochastically interacting robots. Accomplishments The design of reliable embedded control systems inherits the difficulties involved
Results 1 - 10
of
133