Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6) > Verification (D.4.6...)  
  1-10 of 11 Reviews about "Verification (D.4.6...)": Date Reviewed
   An introduction to data: everything you need to know about AI, big data and data science
Corea F.,  Springer International Publishing, New York, NY, 2019. 131 pp. Type: Book (978-3-030044-67-1)

Are you an early practitioner, researcher, business/experience executive, or entrepreneur who uses artificial intelligence (AI), big data, and data sciences in financial services, private investment, or related sectors? This book will help you dev...

Feb 5 2020
  Model checking Petri nets with names using data-centric dynamic systems
Montali M., Rivkin A.  Formal Aspects of Computing 28(4): 615-641, 2016. Type: Article

Carl Adam Petri established Petri net theory, in 1962, with the publication of his doctoral thesis, “Kommunikation mit Automaten.” In the following 54 years, a rich and extensive body of work has been added to the theory and language c...

Mar 10 2017
   Formal verification of information flow security for a simple ARM-based separation kernel
Dam M., Guanciale R., Khakpour N., Nemati H., Schwarz O.  CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany,  Nov 4-8, 2013) 223-234, 2013. Type: Proceedings

There has been considerable recent interest in verifying operating systems [1,2]. One of the difficulties with this form of software verification is simply stating the verification problem formally and succinctly. This, combined with the fact that...

Jan 27 2014
  Dependent type theory for verification of information flow and access control policies
Nanevski A., Banerjee A., Garg D.  ACM Transactions on Programming Languages and Systems 35(2): 1-41, 2013. Type: Article

Security issues are a growing concern in an increasingly connected society. Given the central role played by programming languages in the implementation of information technology systems, introducing such matters early in the specification phase o...

Sep 5 2013
  Trends in Trends in Functional Programming 1999/2000 versus 2007/2008
Achten P., van Eekelen M., Koopman P., Morazán M.  Higher-Order and Symbolic Computation 23(4): 465-487, 2010. Type: Article

This paper analyzes the evolution of the main research topics in functional programming by recounting the evolution of a particular functional programming symposium from 1999 to 2008. The current name of the symposium is Trends in Functional Progr...

Dec 21 2012
  Digital system verification: a combined formal methods and simulation framework
Li L., Thornton M.,  Morgan and Claypool Publishers, San Rafael, CA, 2010. 100 pp. Type: Book (978-1-608451-78-4)

Digital systems verification is a very important topic of research and industrial practice. Anecdotally, about 70 percent of silicon design efforts today go into validation/verification....

Oct 24 2011
  Internet Privacy Enhanced Mail
Kent S.  Communications of the ACM 36(8): 48-60, 1993. Type: Article

Kent discusses PEM, PSRG, IAB, RFC, SRI, OSI, LAN, UA, MTA, POP, TCP, IP, SMTP, UI, MIME, X400, X500, BITNET, UUNET, RFC 822, RFC 821, RFC 1423, CCITT, X509, ISO, MIC, CRL, ASCII, ANSI, MD5, RSA, DEK, DES, CBC, CA, IPRA, DCA, RFC 1422, MIC-ONLY, a...

Nov 1 1994
  A calculus for access control in distributed systems
Abadi M., Burrows M., Lampson B., Plotkin G.  ACM Transactions on Programming Languages and Systems 15(4): 706-734, 1993. Type: Article

One of the major problems in the security of computer systems is access control. Its importance is increased in distributed systems. Thus, access control mechanisms in distributed systems are vital, but they are difficult to implement and even mor...

Aug 1 1994
  Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia,  Jan 8-11, 1990) 211990. Type: Proceedings

Consider a public key cryptosystem function E that transforms a plaintext message M into a ciphertext C = E(M). An individual A wishe...

Sep 1 1991
  The Specification and Modeling of Computer Security
McLean J.  Computer 23(1): 9-16, 1990. Type: Article

The Bell and LaPadula definition of security for computer systems has been widely used for some years as the model followed in the National Computer Security Center’s evaluation process for trusted computer systems. This paper addresses the ...

Oct 1 1990
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy