a |
access control | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |
Access Control Policy | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems |
approximation | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |
Asynchronous testing | Asynchronous testing of real-time systems |
c |
completeness | Asynchronous testing of real-time systems |
component-based software engineering | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage |
computational origami | Origami folds in higher-dimension |
Controlled rewrite system | Transforming Prefix-constrained or Controlled Rewrite Systems |
correct-by-construction | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |
d |
distributed algorithm | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |
dynamic logic | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |
e |
enumeration problem | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |
Euclidean geometry | Origami folds in higher-dimension |
Event-B | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |
expression problem | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage |
f |
FDD | Automatic detection and correction of firewall misconfigurations- A formal approach |
Feature-Oriented Programming | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage |
Firewall | Automatic detection and correction of firewall misconfigurations- A formal approach |
formal analysis | A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |
Formal Verification and Validation | A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |
Fuzzy Extractor | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |
g |
geometric modeling | Origami folds in higher-dimension |
h |
Higher dimensional geometry | Origami folds in higher-dimension |
Hoare logic | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |
i |
Information Systems Security | A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |
l |
Local computations | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |
m |
mathematical origami | Origami folds in higher-dimension |
Misconfiguration | Automatic detection and correction of firewall misconfigurations- A formal approach |
Mobile Social Networks | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |
multi-threading | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |
p |
parallel model checking | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |
predicate logic | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |
Prefix-constrained rewrite system | Transforming Prefix-constrained or Controlled Rewrite Systems |
Privacy | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |
program verification | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |
proximity | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |
r |
Risk | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems |
risk assessment | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |
risk management | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems |
runtime verification | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |
s |
social profile | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |
soundness | Asynchronous testing of real-time systems |
space complexity | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |
Stream Monitoring | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |
symbolic reachability | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |
Synchronous testing | Asynchronous testing of real-time systems |
t |
term rewriting | Transforming Prefix-constrained or Controlled Rewrite Systems |
termination | Transforming Prefix-constrained or Controlled Rewrite Systems |
test generation | Asynchronous testing of real-time systems |