A formal approach to network segmentation
Network segmentation or compartmentalization, and layered protection are two strategies
that are critical in building a secure network. In the literature, layered protection has been …
that are critical in building a secure network. In the literature, layered protection has been …
[图书][B] Network algebra
G Stefanescu - 2012 - books.google.com
Network Algebra considers the algebraic study of networks and their behaviour. It contains
general results on the algebraic theory of networks, recent results on the algebraic theory of …
general results on the algebraic theory of networks, recent results on the algebraic theory of …
Algebraic separation logic
HH Dang, P Höfner, B Möller - The Journal of Logic and Algebraic …, 2011 - Elsevier
We present an algebraic approach to separation logic. In particular, we give an algebraic
characterisation for assertions of separation logic, discuss different classes of assertions and …
characterisation for assertions of separation logic, discuss different classes of assertions and …
[HTML][HTML] Hardening of network segmentation using automated referential penetration testing
We study the problem of hardening the security of existing networks. Dynamic and static
analysis are two main approaches that are used to address this problem. Dynamic analysis …
analysis are two main approaches that are used to address this problem. Dynamic analysis …
Integration of sequential scenarios
J Desharnais, M Frappier, R Khédri… - IEEE Transactions on …, 1998 - ieeexplore.ieee.org
We give a formal relation-based definition of scenarios and we show how different scenarios
can be integrated to obtain a more global view of user-system interactions. We restrict …
can be integrated to obtain a more global view of user-system interactions. We restrict …
Defining and applying measures of distance between specifications
Echoing Louis Pasteur's quote, we submit the premise that it is advantageous to define
measures of distance between requirements specifications because such measures open …
measures of distance between requirements specifications because such measures open …
wp Is w lp
B Möller, G Struth - International Conference on Relational Methods in …, 2005 - Springer
Using only a simple transition relation one cannot model commands that may or may not
terminate in a given state. In a more general approach commands are relations enriched …
terminate in a given state. In a more general approach commands are relations enriched …
[PDF][PDF] Supplementing product families with behaviour
A common approach to dealing with software requirements volatility is to define product
families instead of single products. In earlier papers we have developed an algebra of such …
families instead of single products. In earlier papers we have developed an algebra of such …
Demonic algebra with domain
JL De Carufel, J Desharnais - … on Relational Methods in Computer Science, 2006 - Springer
We first recall the concept of Kleene algebra with domain (KAD). Then we explain how to
use the operators of KAD to define a demonic refinement ordering and demonic operators …
use the operators of KAD to define a demonic refinement ordering and demonic operators …