Causality: models, reasoning, and inference
Causality: models, reasoning, and inference
ACM SIGOPS Operating Systems Review
Chianti: a tool for change impact analysis of java programs
OOPSLA '04 Proceedings of the 19th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Verification and change-impact analysis of access-control policies
Proceedings of the 27th international conference on Software engineering
Error explanation with distance metrics
International Journal on Software Tools for Technology Transfer (STTT)
What causes a system to satisfy a specification?
ACM Transactions on Computational Logic (TOCL)
Differential symbolic execution
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering
Formal Change Impact Analyses of Extended Finite State Machines Using a Theorem Prover
SEFM '08 Proceedings of the 2008 Sixth IEEE International Conference on Software Engineering and Formal Methods
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Using Change Impact Analysis to Select Tests for Extended Finite State Machines
SEFM '09 Proceedings of the 2009 Seventh IEEE International Conference on Software Engineering and Formal Methods
Hi-index | 0.00 |
In this short paper, we provide the background to counterfactual logic and give very general suggestions on how we could employ this logic to help us reason about security policies. It seems very appropriate to use this kind of logic to anticipate a change that will compromise the security concerns of a given system before actually applying the changes.