• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 133
Next 10 →

Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques

by W.M.P. van der Aalst , 2000
"... . Workflow management systems facilitate the everyday operation of business processes by taking care of the logistic control of work. In contrast to traditional information systems, they attempt to support frequent changes of the workflows at hand. Therefore, the need for analysis methods to veri ..."
Abstract - Cited by 88 (10 self) - Add to MetaCart
. Workflow management systems facilitate the everyday operation of business processes by taking care of the logistic control of work. In contrast to traditional information systems, they attempt to support frequent changes of the workflows at hand. Therefore, the need for analysis methods

A Design and Verification Framework for Service Composition in the Cloud

by Matthew L. Hale, Michael T. Gamble, Rose F. Gamble
"... Abstract—The service cloud model allows hosted services to be dynamically provisioned and composed as part of larger, more complex cloud applications. Compatibility of interaction and quality of service are important to provisioning similar services available in the cloud to a client request. Auditi ..."
Abstract - Add to MetaCart
to the composition since sensitive data may be leaked if information flow control guarantees cannot be proven. Service engineering lacks design principles and an expression infrastructure for formal representation and reasoning within a service cloud model. Reasoning over service compositions requires a formal

Monitoring and Management Informatization Framework in China: Design, Verification, and

by Wei Sun, Rui-xia Hou, Xiao-ming Tang
"... Land desertification is the world's most serious environmental problems. As the only country which regularly carried out state-level desertification and sandification monitoring in the world, China had fulfilled out four consecutive desertification and sandification monitoring and accumulated a ..."
Abstract - Add to MetaCart
C/S and B/S architecture and integrated 2D and 3D system was implemented as a science, efficient and practical information platform for national, provincial, county and other monitoring and management departments. And then, based on the actual verification of the informatization framework

Security and Privacy Requirements Analysis within a Social Setting

by Lin Liu, Eric Yu, John Mylopoulos - In Proc. of RE’03 , 2003
"... Security issues for software systems ultimately concern relationships among social actors-stakeholders, system users, potential attackers- and the software acting on their behalf. This paper proposes a methodological framework for dealing with security and privacy requirements based on i*, an agent- ..."
Abstract - Cited by 139 (19 self) - Add to MetaCart
involving security and privacy concerns in the design of agentbased health information systems. In addition, we discuss model evaluation techniques, including qualitative goal model analysis and property verification techniques based on model checking. 1.

User verification in a BioVXML framework

by Enrique Argones-rúa, Elisardo González-agulla, Carmen García-mateo, William Márquez-flórez, Enrique Argones Rúa, Elisardo González Agulla, Carmen García Mateo, Óscar William, Márquez Flórez
"... BioVXML is designed for creating modules of biometric verification while maintaining all the features and capabilities of the original VoiceXML. The user verification can now be performed by processing different biometric traits, such as speech or face, and these features gives us an assurance of th ..."
Abstract - Add to MetaCart
of the user identity, whereas traditional methods such as written passwords do not. BioVXML provides facilities to develop any monomodal or multimodal biometric recognition system, and it simplifies the creation of remote access control to information systems. We also show how BioVXML can be used in a

User verification in a BioVXML framework

by Odyssey The Speaker, Enrique Argones Rúa, Elisardo González Agulla, Carmen García Mateo, Óscar William, Márquez Flórez , 2004
"... We present BioVXML as an extension of the Voice Extensible Markup Language (VoiceXML). BioVXML is designed for creating modules of biometric verification while maintaining all the features and capabilities of the original VoiceXML. The user verification can now be performed by processing different b ..."
Abstract - Add to MetaCart
access control to information systems. We also show how BioVXML can be used in a practical system like an e-learning platform. 1.

Verification and Validation of Control Algorithms by Coupling of Interpreted Petri Nets

by Georg Frey, Lothar Litz - IEEE conference on Systems Man and Cybernetics, IEEE SMC'98 , 1998
"... Interpreted Petri Nets (IPNs) are an extension of the basic Petri Net (PN) framework. They are ordinary PNs with additional components to model the information flow to and from the PN. This contribution gives a general overview of the control design process. Furthermore, it shows how the different t ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Interpreted Petri Nets (IPNs) are an extension of the basic Petri Net (PN) framework. They are ordinary PNs with additional components to model the information flow to and from the PN. This contribution gives a general overview of the control design process. Furthermore, it shows how the different

Toward a Security Domain Model for Static Analysis and Verification of Information Systems

by Alan Shaffer, Mikhail Auguston, Cynthia Irvine, Tim Levin
"... Abstract. Evaluation of high assurance secure computer systems requires that they be designed, developed, verified and tested using rigorous processes and formal methods. The evaluation process must include correspondence between security policy objectives, security specifications, and program imple ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
implementation. This research presents an approach to the verification of programs represented in a specialized Implementation Modeling Language (IML) using a formal security Domain Model (DM). The DM is comprised of an invariant part, which defines the generic concepts of program state, information flow

Runtime verification of authorization hook placement for the Linux security modules framework

by Antony Edwards, Trent Jaeger, Xiaolan Zhang - In Proceedings of the 9th ACM Conference on Computer and Communications Security , 2002
"... We present runtime tools to assist the Linux community in verifying the correctness of the Linux Security Modules (LSM) framework. The LSM framework consists of a set of authorization hooks inserted into the Linux kernel to enable additional authorizations to be performed (e.g., for mandatory access ..."
Abstract - Cited by 14 (4 self) - Add to MetaCart
We present runtime tools to assist the Linux community in verifying the correctness of the Linux Security Modules (LSM) framework. The LSM framework consists of a set of authorization hooks inserted into the Linux kernel to enable additional authorizations to be performed (e.g., for mandatory

SPECIFICATION, DESIGN AND VERIFICATION OF DISTRIBUTED EMBEDDED SYSTEMS AFOSR GRANT FA9550-06-1-0303

by K. Mani Ch, Eric Klavins, Pablo A. Parrilo , 2011
"... Abstract We are investigating the specification, design and verification of distributed systems that combine communications, computation and control in dynamic, uncertain and adversarial en-vironments. Our goal is to develop methods and tools for designing control policies, specifying the properties ..."
Abstract - Add to MetaCart
, development of a framework to reason about information flow in terms of partially ordered sets (posets) and the development of a compositional framework for programming stochastically interacting robots. Accomplishments The design of reliable embedded control systems inherits the difficulties involved
Next 10 →
Results 1 - 10 of 133
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University