AVATAR: A SysML environment for the formal verification of safety and security properties
G Pedroza, L Apvrille, D Knorreck - 2011 11th Annual …, 2011 - ieeexplore.ieee.org
Critical embedded systems-eg, automotive systems-are now commonly distributed, thus
exposing their communication links to attackers. The design of those systems shall therefore …
exposing their communication links to attackers. The design of those systems shall therefore …
[图书][B] A process algebraic approach to software architecture design
Inthe? eldofformalmethodsincomputerscience, concurrencytheoryisreceivinga
constantlyincreasinginterest. Thisisespeciallytrueforprocessalgebra. Althoughit had been …
constantlyincreasinginterest. Thisisespeciallytrueforprocessalgebra. Althoughit had been …
Design and verification of trusted collective adaptive systems
A Aldini - ACM Transactions on Modeling and Computer …, 2018 - dl.acm.org
Collective adaptive systems (CAS) often adopt cooperative operating strategies to run
distributed decision-making mechanisms. Sometimes, their effectiveness massively relies on …
distributed decision-making mechanisms. Sometimes, their effectiveness massively relies on …
A QoS-driven approach to the cloud service addressing attributes of security
H Xu, X Qiu, Y Sheng, L Luo, Y Xiang - IEEE Access, 2018 - ieeexplore.ieee.org
Recently, cloud computing has been widely used by relying on its powerful resource
integration and computing abilities. In the cloud computing system (CCS), the quality of …
integration and computing abilities. In the cloud computing system (CCS), the quality of …
Analysis and taxonomy of security/QoS tradeoff solutions for the future internet
Motivated by the growing convergence of diverse types of networks and the rise of concepts
such as future internet (FI), in this paper, we analyze the coexistence of security mechanisms …
such as future internet (FI), in this paper, we analyze the coexistence of security mechanisms …
Design and validation of a trust-based opportunity-enabled risk management system
Purpose The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and
public devices and communication means in corporate environments, thus representing a …
public devices and communication means in corporate environments, thus representing a …
A context-based parametric relationship model (cprm) to measure the security and qos tradeoff in configurable environments
Heterogeneity of future networks requires the use of extensible models to understand the
Security and QoS tradeoff. We believe that a good starting point is to analyze the Security …
Security and QoS tradeoff. We believe that a good starting point is to analyze the Security …
A general framework for nondeterministic, probabilistic, and stochastic noninterference
A Aldini, M Bernardo - Joint Workshop on Automated Reasoning for …, 2009 - Springer
We introduce a notion of stochastic noninterference aimed at extending the classical
approach to information flow analysis with fine-grain information describing the temporal …
approach to information flow analysis with fine-grain information describing the temporal …
Ask a (n) droid to tell you the odds: probabilistic security-by-contract for mobile devices
Security-by-contract is a paradigm proposed for the secure installation, usage, and
monitoring of apps into mobile devices, with the aim of establishing, controlling, and, if …
monitoring of apps into mobile devices, with the aim of establishing, controlling, and, if …
Approximating Markovian testing equivalence
A Aldini - Theoretical computer science, 2012 - Elsevier
Several approaches have been proposed to relax behavioral equivalences for fine-grain
models including probabilities and time. All of them face two problems behind the notion of …
models including probabilities and time. All of them face two problems behind the notion of …