-
2
-
-
0038070233
-
A rewriting approach to satisfiability procedures
-
Armando A, Ranise S, Rusinowitch M (2003) A rewriting approach to satisfiability procedures. Inf Comput 183(2): 140-164.
-
(2003)
Inf Comput
, vol.183
, Issue.2
, pp. 140-164
-
-
Armando, A.1
Ranise, S.2
Rusinowitch, M.3
-
6
-
-
70849107955
-
Verifying the interplay of authorization policies and workflow in service-oriented architectures
-
(SecureCom 2009)international conference on computational science and engineering (CSE 2009). IEEE Computer Society Press
-
Barletta M, Ranise S, Viganò L (2009) Verifying the interplay of authorization policies and workflow in service-oriented architectures. In: Proceedings of the 2009 international symposium on secure computing (SecureCom 2009), vol. 3 of 2009 international conference on computational science and engineering (CSE 2009). IEEE Computer Society Press, pp 289-299. http://doi. ieeecomputersociety. org/10. 1109/CSE. 2009. 172.
-
(2009)
Proceedings of the 2009 international symposium on secure computing
, vol.3
, pp. 289-299
-
-
Barletta, M.1
Ranise, S.2
Viganò, L.3
-
10
-
-
33845581982
-
Intelligent systems and formal methods in software engineering
-
Beckert B, Hoare T, Hähnle R, Smith DR, Green C, Ranise S, Tinelli C, Ball T, Rajamani SK (2006) Intelligent systems and formal methods in software engineering. IEEE Intell Syst 21(6): 71-81.
-
(2006)
IEEE Intell Syst
, vol.21
, Issue.6
, pp. 71-81
-
-
Beckert, B.1
Hoare, T.2
Hähnle, R.3
Smith, D.R.4
Green, C.5
Ranise, S.6
Tinelli, C.7
Ball, T.8
Rajamani, S.K.9
-
12
-
-
38949086163
-
Access control and authorization constraints for WS-BPEL
-
IEEE Computer Society Press
-
Bertino E, Crampton J, Paci F (2006) Access control and authorization constraints for WS-BPEL. In: Proceedings of ICWS'06. IEEE Computer Society Press, pp 275-284.
-
(2006)
Proceedings of ICWS'06
, pp. 275-284
-
-
Bertino, E.1
Crampton, J.2
Paci, F.3
-
13
-
-
33847702424
-
Bounded model checking
-
Biere A, Cimatti A, Clarke EM, Strichman O, Zhu Y (2003) Bounded model checking. Adv Comput 58: 118-149.
-
(2003)
Adv Comput
, vol.58
, pp. 118-149
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.M.3
Strichman, O.4
Zhu, Y.5
-
14
-
-
85024721960
-
Linear encodings of bounded ltl model checking
-
Biere A, Heljanko K, Junttila TA, Latvala T, Schuppan V (2006) Linear encodings of bounded ltl model checking. Logical methods comput Sci 2(5).
-
(2006)
Logical methods comput Sci
, vol.2
, Issue.5
-
-
Biere, A.1
Heljanko, K.2
Junttila, T.A.3
Latvala, T.4
Schuppan, V.5
-
18
-
-
79952531030
-
Automated validation of security-sensitive web services specified in bpel and rbac
-
Timisoara, Sept. 23-25 (2010). To appear in IEEE Comp. Society
-
Calvi A, Ranise S, Viganò L (2010) Automated validation of security-sensitive web services specified in bpel and rbac. In: Proceedings of 1st workshop on software service (satellite of SYNASC symposium). Timisoara, Sept. 23-25 (2010). To appear in IEEE Comp. Society.
-
(2010)
Proceedings of 1st workshop on software service (satellite of SYNASC symposium)
, pp. 23-25
-
-
Calvi, A.1
Ranise, S.2
Viganò, L.3
-
21
-
-
0036083264
-
Binder, a logic-based security language
-
IEEE Computer Society Press
-
DeTreville J (2002) Binder, a logic-based security language. In: IEEE symposium on security and privacy. IEEE Computer Society Press.
-
(2002)
IEEE symposium on security and privacy
-
-
DeTreville, J.1
-
27
-
-
79958835294
-
-
Fast Home Page
-
Fast Home Page. http://www. lsv. ens-cachan. fr/Software/fast.
-
-
-
-
31
-
-
70350219117
-
Complete instantiation for quantified formulas in satisfiabiliby modulo theories
-
Ge Y, de Moura L (2009) Complete instantiation for quantified formulas in satisfiabiliby modulo theories. In: Proceedings of computer aided verification (CAV). pp 306-320.
-
(2009)
Proceedings of computer aided verification (CAV)
, pp. 306-320
-
-
Ge, Y.1
de Moura, L.2
-
32
-
-
9444252425
-
Model theoretic methods in combined constraint satisfiability
-
Ghilardi S (2004) Model theoretic methods in combined constraint satisfiability. J Autom Reason 33(3-4).
-
(2004)
J Autom Reason
, vol.33
, Issue.4
-
-
Ghilardi, S.1
-
36
-
-
34249933531
-
Coloured petri nets and CPN tools for modelling and validation of concurrent systems
-
Jensen K, Kristensen L, Wells L (2007) Coloured petri nets and CPN tools for modelling and validation of concurrent systems. Int J Softw Tools Technol Transf 9: 213-254.
-
(2007)
Int J Softw Tools Technol Transf
, vol.9
, pp. 213-254
-
-
Jensen, K.1
Kristensen, L.2
Wells, L.3
-
37
-
-
37049005548
-
Predicate abstraction with indexed predicates
-
Lahiri SK, Bryant RE (2007) Predicate abstraction with indexed predicates. ACM Trans Comput Log 9(1).
-
(2007)
ACM Trans Comput Log
, vol.9
, Issue.1
-
-
Lahiri, S.K.1
Bryant, R.E.2
-
38
-
-
33646242539
-
Understanding SPKI/SDSI using first-order logic
-
Li N, Mitchell JC (2006) Understanding SPKI/SDSI using first-order logic. Int J Inf Secur 5(1): 48-64.
-
(2006)
Int J Inf Secur
, vol.5
, Issue.1
, pp. 48-64
-
-
Li, N.1
Mitchell, J.C.2
-
40
-
-
72849111672
-
Automated composition of web services: the astro approach
-
Marconi A, Pistore M, Traverso P (2008) Automated composition of web services: the astro approach. IEEE Data Eng Bull 31(3): 23-26.
-
(2008)
IEEE Data Eng Bull
, vol.31
, Issue.3
, pp. 23-26
-
-
Marconi, A.1
Pistore, M.2
Traverso, P.3
-
44
-
-
0026122705
-
Petri nets and algebraic specifications
-
Reisig W (1991) Petri nets and algebraic specifications. Theor Comput Sci 80(1): 1-34.
-
(1991)
Theor Comput Sci
, vol.80
, Issue.1
, pp. 1-34
-
-
Reisig, W.1
-
47
-
-
70849090093
-
A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes
-
Schaad A, Sohr K, Drouineaud M (2007) A workflow-based model-checking approach to inter- and intra-analysis of organisational controls in service-oriented business processes. J Inf Assur Secur 2(1).
-
(2007)
J Inf Assur Secur
, vol.2
, Issue.1
-
-
Schaad, A.1
Sohr, K.2
Drouineaud, M.3
-
49
-
-
27144534564
-
-
Technical Report 188, Humbolt-Universität zu Berlin
-
Stahl C (2005) A petri net semantics for BPEL. Technical Report 188, Humbolt-Universität zu Berlin.
-
(2005)
A petri net semantics for BPEL
-
-
Stahl, C.1
-
51
-
-
33646176117
-
Combining non-stably infinite theories
-
Tinelli C, Zarba CG (2005) Combining non-stably infinite theories. J Autom Reason 34(3).
-
(2005)
J Autom Reason
, vol.34
, Issue.3
-
-
Tinelli, C.1
Zarba, C.G.2
-
52
-
-
79958863899
-
-
Tools4bpel Home Page
-
Tools4bpel Home Page. http://www2. informatik. hu-berlin. de/top/tools4bpel.
-
-
-
-
53
-
-
33845505698
-
Distributed policy specification and enforcement in service-oriented business systems
-
IEEE Computer Society, Washington, DC, USA
-
Tsai WT, Liu X, Chen Y (2005) Distributed policy specification and enforcement in service-oriented business systems. In: ICEBE '05: Proceedings of the IEEE international conference on e-business engineering. IEEE Computer Society, Washington, DC, USA, pp 10-17.
-
(2005)
In: ICEBE '05: Proceedings of the IEEE international conference on e-business engineering
, pp. 10-17
-
-
Tsai, W.T.1
Liu, X.2
Chen, Y.3
-
54
-
-
27544442301
-
Simulation verification and validation by dynamic policy enforcement
-
IEEE Computer Society, Washington, DC, USA
-
Tsai WT, Liu X, Chen Y, Paul R (2005) Simulation verification and validation by dynamic policy enforcement. In: ANSS '05: Proceedings of the 38th annual Symposium on Simulation. IEEE Computer Society, Washington, DC, USA, pp 91-98.
-
(2005)
ANSS '05: Proceedings of the 38th annual Symposium on Simulation
, pp. 91-98
-
-
Tsai, W.T.1
Liu, X.2
Chen, Y.3
Paul, R.4
-
55
-
-
36749019202
-
A policy enforcement framework for verification and control of service collaboration
-
Tsai W-T, Zhou X, Wei X (2008) A policy enforcement framework for verification and control of service collaboration. Inf Syst E-Bus Manag 6(1): 83-107.
-
(2008)
Inf Syst E-Bus Manag
, vol.6
, Issue.1
, pp. 83-107
-
-
Tsai, W.-T.1
Zhou, X.2
Wei, X.3
-
56
-
-
0002719897
-
The application of Petri nets to workflow management
-
van der Aalst WMP (1998) The application of Petri nets to workflow management. J circuits syst comput 8(1): 21-66.
-
(1998)
J Circuits Syst Comput
, vol.8
, Issue.1
, pp. 21-66
-
-
van der Aalst, W.M.P.1
-
58
-
-
79958835293
-
-
Yices Home Page
-
Yices Home Page. http://yices. csl. sri. com.
-
-
-
-
59
-
-
79958790284
-
-
Z3 Home Page
-
Z3 Home Page. http://research. microsoft. com/en-us/um/redmond/projects/z3/.
-
-
-
-
60
-
-
33645964601
-
Evaluating access control policies through model checking
-
Springer
-
Zhang N, Ryan MD, Guelev D (2005) Evaluating access control policies through model checking. In: Proceedings of ISC'05, LNCS 3650. Springer, pp 446-460.
-
(2005)
Proceedings of ISC'05, LNCS 3650
, pp. 446-460
-
-
Zhang, N.1
Ryan, M.D.2
Guelev, D.3
|