Found 175 results
2008
"Applying Formal Methods to a Certifiably Secure Software System", IEEE Transactions on Software Engineering, vol. 34, issue 1, pp. 82-98, 2008.
"Applying Infinite State Model Checking and Other Analysis Techniques to Tabular Requirements Specifications of Safety-Critical Systems", Design Automation for Embedded Systems, vol. 12, issue 1-2, pp. 97-137, 2008.
2007
Heitmeyer, C. L., and R. Jeffords, "Applying a Formal Requirements Method to Three NASA Systems: Lessons Learned", 2007 IEEE Aerospace Conference, Big Sky, Montana, 2007. HeitmeyerJeffords2007.pdf (616.1 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Deploying Low-Latency Anonymity: Design Challenges and Social Factors", IEEE Security & Privacy, vol. 5, issue 5, pp. 83-87, 2007. Dingledine etal2007.pdf (71.26 KB)
Heitmeyer, C. L., "Formal Methods for Specifying, Validating, and Verifying Requirements", Journal of Computer Science, vol. 13, issue 5, pp. 607-618, 2007. Heitmeyer2007.pdf (466.65 KB)
Overlier, L., and P. Syverson, "Improving Efficiency and Simplicity of Tor circuit establishment and hidden services", 2007 Privacy Enhancing Technologies Symposium, vol. LNCS 4776, 2007. OverlierSyverson2007.pdf (619.35 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "A Model of Onion Routing with Provable Anonymity", Financial Cryptography and Data Security, 11th International Conference, FC 2007, 2007. Feigenbaum etal2007b.pdf (224.34 KB)
Feigenbaum, J., A. Johnson, and P. Syverson, "Probabilistic Analysis of Onion Routing in a Black-box Model [Extended Abstract]", WPES'07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society: ACM Press, pp. 1-10, 2007. Feigenbaum etal2007.pdf (228.68 KB)
Heitmeyer, C. L., R. Jeffords, R. Bharadwaj, and M. Archer, "RE Theory Meets Software Practice: Lessons from the Software Development Trenches", 15th IEEE International Requirements Engineering Conference, New Delhi, India, pp. 265-268, 2007. Heitmeyer etal2007.pdf (521.34 KB)
Kirby, Jr, J., A Unified Specification of Behavior for Requirements and Design, , no. NRL/MR/5540--007-9094, Washington, D.C., Naval Research Laboratory, 2007. Kirby2007.pdf (1018.32 KB)
2006
Bultan, T., and C. L. Heitmeyer, "Analyzing Tabular Requirements Specifications Using Infinite State Model Checking", Fourth ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'06), Napa, California, 2006. BultanHeitmeyer2006.pdf (163.42 KB)
Archer, M., and E. Leonard, "Establishing High Confidence in Code Implementations of Algorithms using Formal Verification of Pseudocode", Proceedings of VERIFY'06, The Third International Verification Workshop, Seattle, Washington, 2006. ArcherLeonard2006.pdf (2.14 MB)
Heitmeyer, C. L., M. Archer, E. Leonard, and J. McLean, "Formal specification and verification of data separation in a separation kernel for an embedded system", 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, pp. 346-355, 2006. Heitmeyer etal2006.pdf (265.8 KB)
Rothamel, T., Y. A. Liu, C. L. Heitmeyer, and E. Leonard, "Generating Optimized Code from SCR Specifications", ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2006), Ottawa, Canada, 2006. Rothamel etal2006.pdf (159.88 KB)
Overlier, L., and P. Syverson, "Locating Hidden Servers", IEEE Symposium on Security and Privacy, Oakland, California, IEEE Computer Society Press, 2006. OverlierSyverson2006b.pdf (852.47 KB)
Kirby, Jr, J., "Model-Driven Agile Development of Reactive Multi-Agent Systems", 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, Illinois, 2006. Kirby2006.pdf (319.81 KB)
"A semi-reversible watermark for medical image authentication", 1st Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare, D2H2 2006, Arlington, Virginia, pp. 59-62, 2006.
Archer, M., HP. Lim, N. Lynch, S. Mitra, and S. Umeno, "Specifying and Proving Properties of Timed I/O Automata in the TIOA Toolkit", Fourth ACM \& IEEE International Conference on Formal Methods and Models for Co-Design, Napa, California, pp. 129-138, 2006. Archer etal2006.pdf (101.11 KB)
Lim, HP., and M. Archer, "Translation Templates to Support Strategy Development in PVS", STRATEGIES06, The Sixth International Workshop on Strategies in Automated Deduction, Seattle, Washington, 2006. LimArcher2006.pdf (2.52 MB)
Overlier, L., and P. Syverson, "Valet Services: Improving Hidden Servers with a Personal Touch", Privacy Enhancing Technologies Workshop, 2006. OverlierSyverson2006.pdf (656.17 KB)
2005
Luo, J., B. Montrose, and M. Kang, "An Approach for Semantic Query Processing with UDDI", Agents, Web Services and Ontologies Merging, Agia Napa, Cyprus, 2005. Luo etal2005.pdf (240.06 KB)
McDermott, J., "Attack-potential-based survivability modeling for high-consequence systems", 3rd International Information Assurance Workshop, College Park, Maryland, 2005. McDermott2005b.pdf (406.04 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Challenges in deploying low-latency anonymity", NRL CHACS, no. 5540-625, 2005. Dingledine etal2005.pdf (202.95 KB)
Ahmed, F., and I. S. Moskowitz, "Composite Signature Based Watermarking for Fingerprint Authentication", ACM Multimedia and Security Workshop, ACM2005 , New York City, New York, 2005. AhmedMoskowitz2005.pdf (486.33 KB)
Jeffords, R., and R. Bharadwaj, "Extended Abstract: Formal Verification of Architectural Patterns in Support of Dependable Distributed Systems", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005. JeffordsBharadwaj2005.pdf (59.54 KB)

Pages