Concurrent manipulation of binary search trees
ACM Transactions on Database Systems (TODS)
Thread-Modular Verification for Shared-Memory Programs
ESOP '02 Proceedings of the 11th European Symposium on Programming Languages and Systems
Completeness of the Owicki-Gries System for Parameterized Parallel Programs
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Proceedings of the ESPRIT Working Group 8533 on Prospects for Hardware Foundations: NADA - New Hardware Design Methods, Survey Chapters
Liveness and Fairness in Process-Algebraic Verification
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
(Im)Possibilities of Predicate Detection in Crash-Affected Systems
WSS '01 Proceedings of the 5th International Workshop on Self-Stabilizing Systems
A Language-Based Approach to Security
Informatics - 10 Years Back. 10 Years Ahead.
Safety Patterns - The Key to Formal Specification of Safety Requirements
SAFECOMP '01 Proceedings of the 20th International Conference on Computer Safety, Reliability and Security
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Verification of Parameterized Systems by Dynamic Induction on Diagrams
CAV '99 Proceedings of the 11th International Conference on Computer Aided Verification
Conformance Checking for Models of Asynchronous Message Passing Software
CAV '02 Proceedings of the 14th International Conference on Computer Aided Verification
Composition: A Way to Make Proofs Harder
COMPOS'97 Revised Lectures from the International Symposium on Compositionality: The Significant Difference
Proving real-time properties of programs with temporal logic
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Approaching a Formal Definition of Fairness in Electronic Commerce
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
A Tool for Testing Liveness in Distributed Object Systems
TOOLS '00 Proceedings of the Technology of Object-Oriented Languages and Systems (TOOLS 34'00)
Formal Verification Using Bounded Model Checking: SAT versus Sequential ATPG Engines
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Decomposition of Fundamental Problems for Cooperative Autonomous Mobile Systems
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
CONCUR 2005 - Concurrency Theory
Putting Detectors in Their Place
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
IEEE Transactions on Computers
A complete characterization of deterministic regular liveness properties
Theoretical Computer Science
Execution monitoring enforcement under memory-limitation constraints
Information and Computation
An approach to synthesise safe systems
International Journal of Security and Networks
Fundamenta Informaticae - Behavior of Composed Concurrent Systems: Logic and Reasoning
Security protocols, properties, and their monitoring
Proceedings of the fourth international workshop on Software engineering for secure systems
Dataflow analysis for concurrent programs using datarace detection
Proceedings of the 2008 ACM SIGPLAN conference on Programming language design and implementation
A type system for data-flow integrity on windows vista
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Modifying Contracts with Larissa Aspects
Electronic Notes in Theoretical Computer Science (ENTCS)
Robustness in Interaction Systems
FORTE '07 Proceedings of the 27th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Verification of a Hierarchical Generic Mutual Exclusion Algorithm
FORTE '08 Proceedings of the 28th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Local Proofs for Linear-Time Properties of Concurrent Programs
CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
Externalizing Java Server Concurrency with CAL
ECOOP '08 Proceedings of the 22nd European conference on Object-Oriented Programming
A general characterization of indulgence
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems
ACM Transactions on Information and System Security (TISSEC)
Formal Analysis of the Bakery Protocol with Consideration of Nonatomic Reads and Writes
ICFEM '08 Proceedings of the 10th International Conference on Formal Methods and Software Engineering
Synthesizing Monitors for Safety Properties: This Time with Calls and Returns
Runtime Verification
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Execution monitoring enforcement for limited-memory systems
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Checking timed Büchi automata emptiness on simulation graphs
ACM Transactions on Computational Logic (TOCL)
A type system for data-flow integrity on Windows Vista
ACM SIGPLAN Notices
Formal analysis tools for the synchronous aspect language Larissa
EURASIP Journal on Embedded Systems - Model-driven high-level programming of embedded systems: selected papers from SLA++P'07 and SLA++P'08
Local proofs for global safety properties
Formal Methods in System Design
Proceedings of the 2009 ACM symposium on Applied Computing
Enforcing Security Policies on Programs
Proceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06
PAT: Towards Flexible Verification under Fairness
CAV '09 Proceedings of the 21st International Conference on Computer Aided Verification
Using Edit Automata for Rewriting-Based Security Enforcement
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Une approche formelle pour i'evaluation de la tolérance aux interruptions des système interactifs
Proceedings of the 21st International Conference on Association Francophone d'Interaction Homme-Machine
Multicore parallel min-cost flow algorithm for CAD applications
Proceedings of the 46th Annual Design Automation Conference
Towards Practical Enforcement Theories
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Scalable Multi-core Model Checking Fairness Enhanced Systems
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
Testing Against Some Eventuality Properties of Synchronous Software: A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
Enforcing IRM security policies: two case studies
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Electronic Notes in Theoretical Computer Science (ENTCS)
Turing machines, transition systems, and interaction
Information and Computation
On the completeness of compositional reasoning methods
ACM Transactions on Computational Logic (TOCL)
A general characterization of indulgence
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Symmetry and completeness in the analysis of parameterized systems
VMCAI'07 Proceedings of the 8th international conference on Verification, model checking, and abstract interpretation
Using controller-synthesis techniques to build property-enforcing layers
ESOP'03 Proceedings of the 12th European conference on Programming
Local proofs for global safety properties
CAV'07 Proceedings of the 19th international conference on Computer aided verification
VMCAI'08 Proceedings of the 9th international conference on Verification, model checking, and abstract interpretation
Issues on the design of efficient fail-safe fault tolerance
ISSRE'09 Proceedings of the 20th IEEE international conference on software reliability engineering
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Event detection and correlation for network environments
IEEE Journal on Selected Areas in Communications
Scalable liveness checking via property-preserving transformations
Proceedings of the Conference on Design, Automation and Test in Europe
Multicore parallelization of min-cost flow for CAD applications
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special section on the ACM IEEE international conference on formal methods and models for codesign (MEMOCODE) 2009
A lock-free, cache-efficient shared ring buffer for multi-core architectures
Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Using equivalence relations for corrective enforcement of security policies
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
An approach for designing and assessing detectors for dependable component-based systems
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
ICTSS'10 Proceedings of the 22nd IFIP WG 6.1 international conference on Testing software and systems
You should better enforce than verify
RV'10 Proceedings of the First international conference on Runtime verification
Invited paper: the inherent complexity of transactional memory and what to do about it
ICDCN'11 Proceedings of the 12th international conference on Distributed computing and networking
Liveness of communicating transactions
APLAS'10 Proceedings of the 8th Asian conference on Programming languages and systems
Mnemosyne: lightweight persistent memory
Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems
A proof-based approach to verifying reachability properties
Proceedings of the 2011 ACM Symposium on Applied Computing
Scaling up with event-B: a case study
NFM'11 Proceedings of the Third international conference on NASA Formal methods
Parallelizing a symbolic compositional model-checking algorithm
HVC'10 Proceedings of the 6th international conference on Hardware and software: verification and testing
Static analysis of run-time errors in embedded critical parallel C programs
ESOP'11/ETAPS'11 Proceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software
Changing flights in mid-air: a model for safely modifying continuous queries
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures
Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation
Symbolic model checking commitment protocols using reduction
DALT'10 Proceedings of the 8th international conference on Declarative agent languages and technologies VIII
Runtime enforcement monitors: composition, synthesis, and enforcement abilities
Formal Methods in System Design
Runtime Verification for LTL and TLTL
ACM Transactions on Software Engineering and Methodology (TOSEM)
On combining state space reductions with global fairness assumptions
FM'11 Proceedings of the 17th international conference on Formal methods
On the refinement of liveness properties of distributed systems
Formal Methods in System Design
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
A dash of fairness for compositional reasoning
CAV'10 Proceedings of the 22nd international conference on Computer Aided Verification
Interfaces as games, programs as strategies
TYPES'04 Proceedings of the 2004 international conference on Types for Proofs and Programs
Automatic formal verification of liveness for pipelined processors with multicycle functional units
CHARME'05 Proceedings of the 13 IFIP WG 10.5 international conference on Correct Hardware Design and Verification Methods
Enforcing non-safety security policies with program monitors
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
WSCMon: runtime monitoring of web service orchestration based on refinement checking
Service Oriented Computing and Applications
Algorithmic verification of asynchronous programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Modular design of man-machine interfaces with larissa
SC'06 Proceedings of the 5th international conference on Software Composition
Verification of LTL on b event systems
B'07 Proceedings of the 7th international conference on Formal Specification and Development in B
Verifying safety properties with the TLA+ proof system
IJCAR'10 Proceedings of the 5th international conference on Automated Reasoning
Component behavior synthesis for critical systems
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
Beyond traces and independence
Dependable and Historic Computing
Local symmetry and compositional verification
VMCAI'12 Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation
Defining Fairness in Reactive and Concurrent Systems
Journal of the ACM (JACM)
Enforceable security policies revisited
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Thread-Modular model checking with iterative refinement
NFM'12 Proceedings of the 4th international conference on NASA Formal Methods
Survey: Linear Temporal Logic Symbolic Model Checking
Computer Science Review
Optimized inlining of runtime monitors
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Proving liveness property under strengthened compassion requirements
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
Testing for concurrency in UML diagrams
ACM SIGSOFT Software Engineering Notes
Fundamenta Informaticae - Behavior of Composed Concurrent Systems: Logic and Reasoning
On Topological Hierarchies of Temporal Properties
Fundamenta Informaticae
Asynchronous programs with prioritized task-buffers
Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
International Journal of Communication Systems
Liveness vs safety: a practical viewpoint
HVC'11 Proceedings of the 7th international Haifa Verification conference on Hardware and Software: verification and testing
Proceedings of the 18th ACM symposium on Access control models and technologies
Enforceable Security Policies Revisited
ACM Transactions on Information and System Security (TISSEC)
Loop invariants: Analysis, classification, and examples
ACM Computing Surveys (CSUR)
Modelling Access Propagation in Dynamic Systems
ACM Transactions on Information and System Security (TISSEC)
A symbolic model checking approach to verifying satellite onboard software
Science of Computer Programming
Model checking with fairness assumptions using PAT
Frontiers of Computer Science: Selected Publications from Chinese Universities
Iterative enforcement by suppression: Towards practical enforcement theories
Journal of Computer Security - ARSPA-WITS'10
Hi-index | 0.01 |
The inductive assertion method is generalized to permit formal, machine-verifiable proofs of correctness for multiprocess programs. Individual processes are represented by ordinary flowcharts, and no special synchronization mechanisms are assumed, so the method can be applied to a large class of multiprocess programs. A correctness proof can be designed together with the program by a hierarchical process of stepwise refinement, making the method practical for larger programs. The resulting proofs tend to be natural formalizations of the informal proofs that are now used.