Home
EPiC Series
Kalpa Publications
Preprints
For Authors
For Editors
Volume
•
Abstracts
•
Preface
•
Authors
•
Keywords
•
BibTex Entries
SCSS 2017: Keyword Index
Keyword
Papers
a
access control
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
Access Control Policy
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
approximation
Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
Asynchronous testing
Asynchronous testing of real-time systems
c
completeness
Asynchronous testing of real-time systems
component-based software engineering
Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage
computational origami
Origami folds in higher-dimension
Controlled rewrite system
Transforming Prefix-constrained or Controlled Rewrite Systems
correct-by-construction
Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
d
distributed algorithm
Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
dynamic logic
C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions
e
enumeration problem
Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
Euclidean geometry
Origami folds in higher-dimension
Event-B
Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
expression problem
Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage
f
FDD
Automatic detection and correction of firewall misconfigurations- A formal approach
Feature-Oriented Programming
Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage
Firewall
Automatic detection and correction of firewall misconfigurations- A formal approach
formal analysis
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
Formal Verification and Validation
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
Fuzzy Extractor
Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
g
geometric modeling
Origami folds in higher-dimension
h
Higher dimensional geometry
Origami folds in higher-dimension
Hoare logic
C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions
i
Information Systems Security
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
l
Local computations
Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
m
mathematical origami
Origami folds in higher-dimension
Misconfiguration
Automatic detection and correction of firewall misconfigurations- A formal approach
Mobile Social Networks
Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
multi-threading
A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems
p
parallel model checking
A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems
predicate logic
Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
Prefix-constrained rewrite system
Transforming Prefix-constrained or Controlled Rewrite Systems
Privacy
Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
program verification
C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions
proximity
Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
r
Risk
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
risk assessment
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
risk management
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
runtime verification
Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
s
social profile
Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
soundness
Asynchronous testing of real-time systems
space complexity
Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
Stream Monitoring
Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
symbolic reachability
A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems
Synchronous testing
Asynchronous testing of real-time systems
t
term rewriting
Transforming Prefix-constrained or Controlled Rewrite Systems
termination
Transforming Prefix-constrained or Controlled Rewrite Systems
test generation
Asynchronous testing of real-time systems
Copyright © 2012-2024 easychair.org. All rights reserved.