212,900 Hits in 5.3 sec

A Few Remarks about Formal Development of Secure Systems

Éric Jaeger, Thérèse Hardin
2008 2008 11th IEEE High Assurance Systems Engineering Symposium  
Formal methods provide remarkable tools allowing for high levels of confidence in the correctness of developments.  ...  But effectively specifying a secure system or deriving a secure implementation can be tricky.  ...  In this paper, we discuss a few concerns more specifically related to the formal development of secure systems.  ... 
doi:10.1109/hase.2008.49 dblp:conf/hase/JaegerH08 fatcat:6e4sjvrctnel5an4sp37kkwfsq

Six Themes for Future Concurrency Research

J.C.M. Baeten, J.A. Bergstra
2006 Electronical Notes in Theoretical Computer Science  
We list a few themes that might have attention in the coming few years in the area of concurrency research.  ...  We talk about widening the scope beyond computer science, about web services and grid computing, about hybrid systems, mobility and security, agents and games, and natural computing.  ...  Both developments heavily depend on the design of novel protocols. The universal presence of security based protocols makes these protocols remarkably complex.  ... 
doi:10.1016/j.entcs.2005.12.090 fatcat:q6u4fan3obetnmmj245352gsea

Extending Security Protocol Analysis: New Challenges

Mike Bond, Jolyon Clulow
2005 Electronical Notes in Theoretical Computer Science  
Using simple example protocols, we illustrate a number of attacks that are vital to avoid in security API design, but that have yet to be modelled using a formal analysis tool.  ...  We seek to extract the basic ideas behind these attacks and package them into a wish list of functionality for future research and tool development.  ...  These attacks ranged in degrees of complexity, but some of the most trivial and obvious weaknesses from the perspective of a security API designer caused a remarkable amount of trouble.  ... 
doi:10.1016/j.entcs.2004.09.036 fatcat:ai2ehglhprauxoijgo4hvskpha

Page 1221 of American Journal of Public Health Vol. 30, Issue 10 [page]

1940 American Journal of Public Health  
I shall try to shape my remarks around what the merit system will mean to him and what he should do about it.  ...  These few remarks are not addressed to the administrators of the several departments as such but rather to the individual health worker.  ... 

Suicidal Behavior in the Honiara Area of the Solomon Islands

Saxby Pridmore
1996 International Journal of Mental Health  
First, community markets mostly function at the margins of formal economic systems and do not generate government revenue, so remain a low priority for scarce public expenditure.  ...  There is little, if any, provision of formal security or governance.  ... 
doi:10.1080/00207411.1996.11449376 fatcat:ugdzqoe5efarra5jeditfiwr4i

The New Security Paradigms Workshop - boom or bust?

Marvin Schaefer
2001 Proceedings of the 2001 workshop on New security paradigms - NSPW '01  
community, and with the development of System Development Corporation's ADEPT-50 multilevel secure prototype operating system.  ...  By 1984, security research had become such a dull topic that secure system/secure product development had been largely tremsitioned to mainstream industry.  ... 
doi:10.1145/508171.508192 dblp:conf/nspw/Schaefer01 fatcat:aigr7ashffeh3atxqlivjxpznu

The Impact of the Informal Employment on the Social Security Deficits in Turkey

Adem Yavuz Elveren
2015 World Journal of Applied Economics  
This study examines the impact of the formalization of the labor market on social security deficits in Turkey.  ...  After a brief discussion on the causes and consequences of the informality of the economy, the paper reveals the effect of possible developments in the labor market, --such as the reduction in informal  ...  The development indicates that there has been a remarkable decline in the number of people who work in the informal sector, which is particularly of importance for the future of the social security system  ... 
doi:10.22440/ fatcat:gqzchzvctjgtdafsjuhrmvtzd4

A Formal Approach to Network/Distributed Systems Complex Testing

Andrey A. Shchurov, Radek Mařík, Vladimir A. Khlevnoy
2015 International Journal of Computer Trends and Technology  
The next step, based on the analysis of the implementation phase of System Development Life Cycle, determines a formal model for these processes  ...  This work provides a survey of testing activities with regard to these systems based on standards and actual practices for both software-based and distribution (network) aspects.  ...  ACKNOWLEDGMENT This research has been performed within the scientific activities at the Department of Telecommunication Engineering of the Czech Technical University in Prague, Faculty of Electrical Engineering  ... 
doi:10.14445/22312803/ijctt-v22p115 fatcat:kqoap5haz5gzfluqtrr4gzzo5q

The use of Z [chapter]

Rosalind Barden, Susan Stepney, David Cooper
1991 Workshops in Computing  
Many institutions use Z because they choose to, rather than because it is mandated by a defence or security related client.  ...  Nearly all the institutions who have used Z intend to do so again; those who don't plan to use a formal method more appropriate to their needs.  ...  The proof work varied from simply stating a few obligations, to proving theorems about the system formally. Figure 9 shows the number of projects surveyed undertaking some form of proof.  ... 
doi:10.1007/978-1-4471-3203-5_5 fatcat:iussakfbgvfrphcb24ujadqvku

Economics, Psychology, and Sociology of Security [chapter]

Andrew Odlyzko
2003 Lecture Notes in Computer Science  
The really massive financial disasters of the last few years, such as those at Enron, Long Term Capital Management, or WorldCom, owed nothing to inadequacy of information security systems.  ...  However, that is not likely to to be a fatal impediment to the development and deployment of information technology.  ...  The extended discussion of most people's difficulties with formal methods is motivated by the fact that security systems are conceived, developed, and deployed by technologists.  ... 
doi:10.1007/978-3-540-45126-6_13 fatcat:yg7su3otfzc6vku5vplx6vq4ti

Practice-oriented courses in formal methods using VDM++

Peter Gorm Larsen, John S. Fitzgerald, Steve Riddle
2008 Formal Aspects of Computing  
This work has been partly supported by the European Union's Framework 6 Network of Excellence on Resilience in IST (ReSIST).  ...  Concluding remarks We have presented a practical approach to the lightweight use of an established formal method as a means of developing abstraction and rigorous analysis skills among Computing Science  ...  Our trusted gateway example is derived from one of very few studies comparing a software development done with and without formal modelling [FBGL94, BFL96] .  ... 
doi:10.1007/s00165-008-0068-5 fatcat:lbvk7vsoovh5je4a4r4372ulve


Girma Abebe, Amanuel Alemu
2017 International journal of research - granthaalayah  
In practice, whenever a farmer is talking about getting a new seed it implies that she or he is deciding to adopt a new variety.  ...  Similarly, seed is pivotal in the improvement of food security and farm household livelihood.  ...  and veterinary Medicine Liberians because of reference material helping and guide me how I can write this paper  ... 
doi:10.29121/granthaalayah.v5.i2.2017.1746 fatcat:sa3rggxmnrgujl6pei5d2vo4wy

Editorial Remarks (Vol. 3, No. 1-2)

John Lie, Wonho Jang, University of Seoul, UC Berkeley, Ingyu Oh, Kansai Gaidai University
2020 Culture and Empathy International Journal of Sociology Psychology and Cultural Studies  
These views are radically different from some of the ongoing misunderstanding about K-pop, which asserts that it is a copy of Jpop or American hip hop with few innovations.  ...  Hallyu's success with glocalization demonstrates that the domestic Korean demand for high quality pop culture has brought about Editorial Remarks 2 new types of competition that call for importing global  ... 
doi:10.32860/26356619/2020/3.12.0001 fatcat:fulfmzunija5bo6al2kpwfkfqu

Integrating security into the curriculum

C.E. Irvine, Shiu-Kai Chin
1998 Computer  
Cybersquare Computer security can be used as a vehicle to achieve accreditation goals for computer science and engineering programs, while at the same time engaging students with relevant, exciting topics  ...  The authors' approach, based on educational outcomes, illustrates that security topics can contribute to an engineering program by fostering all skills required to produce graduates capable of critical  ...  Topics appropriate to a security-oriented curriculum include security policy models; formal methods applied to system specification, development, and analysis; hardware and software protection mechanisms  ... 
doi:10.1109/2.735847 fatcat:pf56lz3ksvet5hmkoiooiuezc4

Formal methods

Jim Woodcock, Peter Gorm Larsen, Juan Bicarregui, John Fitzgerald
2009 ACM Computing Surveys  
Finally, we look to the future and describe the development of a Verified Software Repository, part of the worldwide Verified Software Initiative.  ...  Based on this, we discuss the issues surrounding the industrial adoption of formal methods.  ...  Our work has benefited from a previous study carried out for BAE Systems, and we gratefully acknowledge our collaboration with Ana Cavalcanti, Colin O'Halloran, and Nick Tudor, and discussions with Jim  ... 
doi:10.1145/1592434.1592436 fatcat:i5gxogcidbemjpf3jopgobzrxe
« Previous Showing results 1 — 15 out of 212,900 results