SCSS 2017:Keyword Index

KeywordPapers
A
access controlTowards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
Access Control PolicyTowards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
approximationMeasuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
Asynchronous testingAsynchronous testing of real-time systems
C
completenessAsynchronous testing of real-time systems
component-based software engineeringIntegration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage
computational origamiOrigami folds in higher-dimension
Controlled rewrite systemTransforming Prefix-constrained or Controlled Rewrite Systems
correct-by-construction Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
D
distributed algorithm Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
dynamic logicC2PDLS: A Combination of Combinatory and Converse PDL with Substitutions
E
enumeration problem Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
Euclidean geometryOrigami folds in higher-dimension
Event-B Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
expression problemIntegration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage
F
FDDAutomatic detection and correction of firewall misconfigurations- A formal approach
Feature-Oriented ProgrammingIntegration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage
FirewallAutomatic detection and correction of firewall misconfigurations- A formal approach
formal analysisA Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
Formal Verification and ValidationA Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
Fuzzy ExtractorPrivate Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
G
geometric modelingOrigami folds in higher-dimension
H
Higher dimensional geometryOrigami folds in higher-dimension
Hoare logicC2PDLS: A Combination of Combinatory and Converse PDL with Substitutions
I
Information Systems SecurityA Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
L
Local computations Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques
M
mathematical origamiOrigami folds in higher-dimension
MisconfigurationAutomatic detection and correction of firewall misconfigurations- A formal approach
Mobile Social NetworksPrivate Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
multi-threadingA Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems
P
parallel model checkingA Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems
predicate logicMeasuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
Prefix-constrained rewrite systemTransforming Prefix-constrained or Controlled Rewrite Systems
PrivacyPrivate Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
program verificationC2PDLS: A Combination of Combinatory and Converse PDL with Substitutions
proximityPrivate Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
R
RiskTowards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
risk assessmentTowards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment
risk managementTowards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems
runtime verificationMeasuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
S
social profilePrivate Profile Matching for Mobile Social Networks Based on Fuzzy Extractors
soundnessAsynchronous testing of real-time systems
space complexityMeasuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
Stream MonitoringMeasuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications
symbolic reachabilityA Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems
Synchronous testingAsynchronous testing of real-time systems
T
term rewritingTransforming Prefix-constrained or Controlled Rewrite Systems
terminationTransforming Prefix-constrained or Controlled Rewrite Systems
test generationAsynchronous testing of real-time systems