Pervasive systems, that is roughly speaking systems that can interact with their environment, are increasingly common. In such systems, there are many dimensions to assess: security and reliability, safety and liveness, real-time response, etc. So far modelling and formalizing attempts have been very piecemeal approaches. This paper describes our analysis of a pervasive case study (MATCH, a homecare application) and our proposal for formal (particularly verification) approaches. Our goal is to see to what extent current state of the art formal methods are capable of coping with the verification demand introduced by pervasive systems, and to point out their limitations
Abstract. Key management is fundamental to communications security, and for security in pervasive co...
This paper discusses the main issues regarding the reliability and the efficacy of standard cryptogr...
Although some progress has been made in the development of principles to guide the designers of inte...
Abstract: Pervasive systems, that is roughly speaking systems that can interact with their environme...
Pervasive systems, that is roughly speaking systems that can interact with their environment, are in...
As ubiquitous computing becomes a reality, its applications are increasingly being used in business-...
We consider the problem of verifying context-aware, pervasive, interactive systems when the interact...
Abstract: We consider the problem of verifying context-aware, pervasive, inter-active systems when t...
yesThe complexity of pervasive systems arises from the many different aspects that such systems poss...
Pervasive computing (PvC) systems are emerging as promising solutions to many practical problems, e....
The design of security-critical pervasive systems is challenging due to that security constraints ar...
This paper reports on the use of a method to encourage the use of formal verification to explore the...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
International audienceFormal methods are proven techniques that provide a rigorous mathematical basi...
AbstractThe quest for the formal certification of properties of systems is one of the most challengi...
Abstract. Key management is fundamental to communications security, and for security in pervasive co...
This paper discusses the main issues regarding the reliability and the efficacy of standard cryptogr...
Although some progress has been made in the development of principles to guide the designers of inte...
Abstract: Pervasive systems, that is roughly speaking systems that can interact with their environme...
Pervasive systems, that is roughly speaking systems that can interact with their environment, are in...
As ubiquitous computing becomes a reality, its applications are increasingly being used in business-...
We consider the problem of verifying context-aware, pervasive, interactive systems when the interact...
Abstract: We consider the problem of verifying context-aware, pervasive, inter-active systems when t...
yesThe complexity of pervasive systems arises from the many different aspects that such systems poss...
Pervasive computing (PvC) systems are emerging as promising solutions to many practical problems, e....
The design of security-critical pervasive systems is challenging due to that security constraints ar...
This paper reports on the use of a method to encourage the use of formal verification to explore the...
"The original publication is available at www.springerlink.com”. Copyright Springer. [Full text of t...
International audienceFormal methods are proven techniques that provide a rigorous mathematical basi...
AbstractThe quest for the formal certification of properties of systems is one of the most challengi...
Abstract. Key management is fundamental to communications security, and for security in pervasive co...
This paper discusses the main issues regarding the reliability and the efficacy of standard cryptogr...
Although some progress has been made in the development of principles to guide the designers of inte...