A survey of approaches combining safety and security for industrial control systems
S Kriaa, L Pietre-Cambacedes, M Bouissou… - Reliability engineering & …, 2015 - Elsevier
The migration towards digital control systems creates new security threats that can endanger
the safety of industrial infrastructures. Addressing the convergence of safety and security …
the safety of industrial infrastructures. Addressing the convergence of safety and security …
JavaScript: the first 20 years
A Wirfs-Brock, B Eich - Proceedings of the ACM on Programming …, 2020 - dl.acm.org
How a sidekick scripting language for Java, created at Netscape in a ten-day hack, ships first
as a de facto Web standard and eventually becomes the world's most widely used …
as a de facto Web standard and eventually becomes the world's most widely used …
Tom: Piggybacking rewriting on java
We present the Tom language that extends Java with the purpose of providing high level
constructs inspired by the rewriting community. Tom furnishes a bridge between a general …
constructs inspired by the rewriting community. Tom furnishes a bridge between a general …
Run your research: on the effectiveness of lightweight mechanization
C Klein, J Clements, C Dimoulas, C Eastlund… - ACM SIGPLAN …, 2012 - dl.acm.org
Formal models serve in many roles in the programming language community. In its primary
role, a model communicates the idea of a language design; the architecture of a language …
role, a model communicates the idea of a language design; the architecture of a language …
Relational programming in miniKanren: techniques, applications, and implementations
WE Byrd - 2009 - search.proquest.com
The promise of logic programming is that programs can be written relationally, without
distinguishing between input and output arguments. Relational programs are remarkably …
distinguishing between input and output arguments. Relational programs are remarkably …
Reputation-based trust management
V Shmatikov, C Talcott - Journal of Computer Security, 2005 - content.iospress.com
We propose a formal model for reputation-based trust management. In contrast to credential-
based trust management, in our framework an agent's reputation serves as the basis for …
based trust management, in our framework an agent's reputation serves as the basis for …
SOS formats and meta-theory: 20 years after
In 1981 Structural Operational Semantics (SOS) was introduced as a systematic way to
define operational semantics of programming languages by a set of rules of a certain shape …
define operational semantics of programming languages by a set of rules of a certain shape …
Handling mixed-criticality in SoC-based real-time embedded systems
R Pellizzoni, P Meredith, MY Nam, M Sun… - Proceedings of the …, 2009 - dl.acm.org
System-on-Chip (SoC) is a promising paradigm to implement safety-critical embedded
systems, but it poses significant challenges from a design and verification point of view. In …
systems, but it poses significant challenges from a design and verification point of view. In …
Symbolic model checking of infinite-state systems using narrowing
S Escobar, J Meseguer - International Conference on Rewriting …, 2007 - Springer
Rewriting is a general and expressive way of specifying concurrent systems, where
concurrent transitions are axiomatized by rewrite rules. Narrowing is a complete symbolic …
concurrent transitions are axiomatized by rewrite rules. Narrowing is a complete symbolic …
A verifiable simulation model for real-world microscopic traffic simulations
This article presents a scientific discussion about the ongoing progress in the development
of traffic simulation system platforms. As part of the discussion, the presentation introduces a …
of traffic simulation system platforms. As part of the discussion, the presentation introduces a …