50 results on '"RANISE A"'
Search Results
2. TLSAssistant Goes FINSEC A Security Platform Integration Extending Threat Intelligence Language
3. Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments
4. Enroll, and Authentication Will Follow
5. An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures
6. Verifiable Contracting
7. Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper)
8. Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations
9. Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations
10. Scalable Automated Analysis of Access Control and Privacy Policies
11. On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows
12. Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes
13. ASASPXL: New Clother for Analysing ARBAC Policies
14. Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios
15. A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies
16. Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations
17. ALPS: An Action Language for Policy Specification and Automated Safety Analysis
18. Boosting Model Checking to Analyse Large ARBAC Policies
19. Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows
20. Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities
21. On the Automated Analysis of Safety in Usage Control: A New Decidability Result
22. Lazy Abstraction with Interpolants for Arrays
23. Automated Analysis of Infinite State Workflows with Access Control Policies
24. From Strong Amalgamability to Modularity of Quantifier-Free Interpolation
25. SAFARI: SMT-Based Abstraction for Arrays with Interpolants
26. Automated and Efficient Analysis of Role-Based Access Control with Attributes
27. A Combination of Rewriting and Constraint Solving for the Quantifier-Free Interpolation of Arrays with Integer Difference Constraints
28. The SMT-LIB Initiative and the Rise of SMT
29. Automated Symbolic Analysis of ARBAC-Policies
30. MCMT: A Model Checker Modulo Theories
31. Noetherianity and Combination Problems
32. Deciding Extensions of the Theory of Arrays by Integrating Decision Procedures and Instantiation Strategies
33. Decidability and Undecidability Results for Nelson-Oppen and Rewrite-Based Decision Procedures
34. Automatic Combinability of Rewriting-Based Satisfiability Procedures
35. On Superposition-Based Satisfiability Procedures and Their Combination
36. On a Rewriting Approach to Satisfiability Procedures: Extension, Combination of Theories and an Experimental Appraisal
37. Combining Data Structures with Nonstably Infinite Theories Using Many-Sorted Logic
38. Efficient Satisfiability Modulo Theories via Delayed Theory Combination
39. Combining Lists with Non-stably Infinite Theories
40. Nelson-Oppen, Shostak and the Extended Canonizer: A Family Picture with a Newborn
41. Abstraction-Driven Verification of Array Programs
42. System Description: RDL Rewrite and Decision Procedure Laboratory
43. Uniform Derivation of Decision Procedures by Superposition
44. The Phase Transition of the Linear Inequalities Problem
45. Termination of Constraint Contextual Rewriting
46. Integrating a Pentesting Tool for IdM Protocols in a Continuous Delivery Pipeline.
47. Building Extended Canonizers by Graph-Based Deduction
48. Combining Proof-Producing Decision Procedures
49. Towards SMT Model Checking of Array-Based Systems
50. Combination Methods for Satisfiability and Model-Checking of Infinite-State Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.