Results 1 - 10
of
38
Automating Formal Proofs for Reactive Systems
"... Implementing systems in proof assistants like Coq and proving their correctness in full formal detail has consistently demonstrated promise for making extremely strong guarantees about critical soft-ware, ranging from compilers and operating systems to databases and web browsers. Unfortunately, thes ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
expending effort comparable to the manual verification of a single system. A cru-cial insight of our approach is simultaneously designing both (1) a domain-specific language (DSL) for expressing reactive systems and their correctness properties and (2) proof automation which exploits the constrained
Exploiting SAT and SMT techniques for automated reasoning and ontology manipulation in description logics
, 2011
"... The quest of efficient and scalable reasoning procedures arising from the area of Descrip-tion Logics and its notable applications in the prominent domains of Semantic Web and bio-medical ontologies, on one hand, and the wide variety of mature and efficient tech-nologies offered by the SAT research ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
area, on the other hand, motivated our research. In this thesis we explore the idea of exploiting the power and efficiency of state-of-the-art SAT-based and SMT-based techniques for automated reasoning and ontology manipula-tion in Description Logics, proposing a valid alternative to the traditional
Supporting Automated Vulnerability Analysis using Formalized Vulnerability Signatures
"... Adopting publicly accessible platforms such as cloud computing model to host IT systems has become a leading trend. Although this helps to minimize cost and increase availability and reachability of applications, it has serious implications on applications ’ security. Hackers can easily exploit vuln ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
Adopting publicly accessible platforms such as cloud computing model to host IT systems has become a leading trend. Although this helps to minimize cost and increase availability and reachability of applications, it has serious implications on applications ’ security. Hackers can easily exploit
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
sociological theory able to grasp emerging forms of social organization and con ict. This theory is still in its explorator y stage, and should remain, like all relevant theories, as a work in progress open to recti cation by empirical research. Because I am trying to distill theory from observation, I
Formalization of Web Security Patterns ASHISH KUMAR DWIVEDI1
"... Abstract. Security issues in software industries become more and more challenging due to malicious attacks and as a result, it leads to exploration of various security holes in software system. In order to se-cure the information assets associated with any software system, organizations plan to desi ..."
Abstract
- Add to MetaCart
. In this study, an attempt has been made to compose security patterns for the web-based application. Subsequently, a formal modeling approach for the composition of security patterns is presented. In order to maximize comprehensibility, Unified Modeling Language (UML) notations are used to represent structural
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
- In Proceedings of 17th Annual Computer Security Applications Conference
, 2001
"... Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result from implicit assumptions made by an application about its inputs. One approach to defending against their exploitation is ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
process based on a simple formal description of a broad class of assumptions about the inputs to an application. Focusing on the back-end server application case, we have prototyped an easy-to-use tool that generates server-side filtering scripts. These can then be quickly installed on a front-end web
A graph-based approach towards discerning inherent structures in a digital library of formal mathematics
- In Lecture Notes in Computer Science
, 2004
"... Abstract. As the amount of online formal mathematical content grows, for example through active efforts such as the Mathweb [21], MOWGLI [4], Formal Digital Library, or FDL [1], and others, it becomes increasingly valuable to find automated means to manage this data and capture semantics such as rel ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
dependencies. By exploiting this link structure, we show how one may extract organizational and relatedness information from a collection of digital formal math. We discuss the value of the information we can extract, yielding potential applications in math search tools, theorem proving, and education.
Abstract Automated Vulnerability Analysis Using AI Planning
"... As networked systems become more complex, and they support more critical applications, there is a compelling need to augment the Red Team approach to vulnerability analysis with more formal, automated methods. Artificial Intelligence (AI) Planning, with its welldeveloped theory and rich set of tools ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
As networked systems become more complex, and they support more critical applications, there is a compelling need to augment the Red Team approach to vulnerability analysis with more formal, automated methods. Artificial Intelligence (AI) Planning, with its welldeveloped theory and rich set
DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract
- Add to MetaCart
Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy
QOS WITH RELIABILITY AND SCALABILITY IN ADAPTIVE SERVICE-BASED SYSTEMS
"... Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be manage ..."
Abstract
- Add to MetaCart
to be managed in an equally adaptive and predictable way. To address this need, we introduce a novel, tool-supported framework for the development of adaptive servicebased systems called QoSMOS (QoS Management and Optimization of Service-based systems). QoSMOS can be used to develop service-based systems
Results 1 - 10
of
38