Browse All Reviews
Operating Systems (D.4)
Security and Protection (D.4.6)
> Verification (D.4.6...)
All Media Types
1-10 of 11 Reviews about "
An introduction to data: everything you need to know about AI, big data and data science
Corea F., Springer International Publishing, New York, NY, 2019. 131 pp. Type: Book (978-3-030044-67-1)
Are you an early practitioner, researcher, business/experience executive, or entrepreneur who uses artificial intelligence (AI), big data, and data sciences in financial services, private investment, or related sectors? This book will help you dev...
Feb 5 2020
Model checking Petri nets with names using data-centric dynamic systems
Montali M., Rivkin A. Formal Aspects of Computing 28(4): 615-641, 2016. Type: Article
Carl Adam Petri established Petri net theory, in 1962, with the publication of his doctoral thesis, “Kommunikation mit Automaten.” In the following 54 years, a rich and extensive body of work has been added to the theory and language c...
Mar 10 2017
Formal verification of information flow security for a simple ARM-based separation kernel
Dam M., Guanciale R., Khakpour N., Nemati H., Schwarz O. CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, Nov 4-8, 2013) 223-234, 2013. Type: Proceedings
There has been considerable recent interest in verifying operating systems [1,2]. One of the difficulties with this form of software verification is simply stating the verification problem formally and succinctly. This, combined with the fact that...
Jan 27 2014
Dependent type theory for verification of information flow and access control policies
Nanevski A., Banerjee A., Garg D. ACM Transactions on Programming Languages and Systems 35(2): 1-41, 2013. Type: Article
Security issues are a growing concern in an increasingly connected society. Given the central role played by programming languages in the implementation of information technology systems, introducing such matters early in the specification phase o...
Sep 5 2013
Trends in Trends in Functional Programming 1999/2000 versus 2007/2008
Achten P., van Eekelen M., Koopman P., Morazán M. Higher-Order and Symbolic Computation 23(4): 465-487, 2010. Type: Article
This paper analyzes the evolution of the main research topics in functional programming by recounting the evolution of a particular functional programming symposium from 1999 to 2008. The current name of the symposium is Trends in Functional Progr...
Dec 21 2012
Digital system verification: a combined formal methods and simulation framework
Li L., Thornton M., Morgan and Claypool Publishers, San Rafael, CA, 2010. 100 pp. Type: Book (978-1-608451-78-4)
Digital systems verification is a very important topic of research and industrial practice. Anecdotally, about 70 percent of silicon design efforts today go into validation/verification....
Oct 24 2011
Internet Privacy Enhanced Mail
Kent S. Communications of the ACM 36(8): 48-60, 1993. Type: Article
Kent discusses PEM, PSRG, IAB, RFC, SRI, OSI, LAN, UA, MTA, POP, TCP, IP, SMTP, UI, MIME, X400, X500, BITNET, UUNET, RFC 822, RFC 821, RFC 1423, CCITT, X509, ISO, MIC, CRL, ASCII, ANSI, MD5, RSA, DEK, DES, CBC, CA, IPRA, DCA, RFC 1422, MIC-ONLY, a...
Nov 1 1994
A calculus for access control in distributed systems
Abadi M., Burrows M., Lampson B., Plotkin G. ACM Transactions on Programming Languages and Systems 15(4): 706-734, 1993. Type: Article
One of the major problems in the security of computer systems is access control. Its importance is increased in distributed systems. Thus, access control mechanisms in distributed systems are vital, but they are difficult to implement and even mor...
Aug 1 1994
Direct demonstration of the power to break public-key cryptosystems
Koyama K. Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990) 211990. Type: Proceedings
Consider a public key cryptosystem function
that transforms a plaintext message
into a ciphertext
). An individual
Sep 1 1991
The Specification and Modeling of Computer Security
McLean J. Computer 23(1): 9-16, 1990. Type: Article
The Bell and LaPadula definition of security for computer systems has been widely used for some years as the model followed in the National Computer Security Center’s evaluation process for trusted computer systems. This paper addresses the ...
Oct 1 1990
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2021 ThinkLoud, Inc.