Web Services, Formal Methods, and Behavioral Types

s of Invited Talks Verification of Data-Aware Processes

[1]  E. Riccobene,et al.  Automatic Review of Abstract State Machines by Meta Property Verification , 2010, NASA Formal Methods.

[2]  Demis Ballis,et al.  A Rule-based System for Web site Verification , 2006, Electron. Notes Theor. Comput. Sci..

[3]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[4]  Insup Lee,et al.  Privacy APIs: access control techniques to analyze and verify legal privacy policies , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[5]  Insup Lee,et al.  Run-Time Checking of Dynamic Properties , 2006, Electron. Notes Theor. Comput. Sci..

[6]  A. Jefferson Offutt,et al.  Modeling presentation layers of web applications for testing , 2009, Software & Systems Modeling.

[7]  Sun Mao-shan,et al.  A model checking approach to Web application navigation model with session mechanism , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[8]  Antonio Cisternino,et al.  Modeling web applications infrastructure with ASMs , 2014, Sci. Comput. Program..

[9]  James R. Cordy,et al.  Modelling methods for web application verification and testing: state of the art , 2009, Softw. Test. Verification Reliab..

[10]  Paolo Arcaini,et al.  A model‐driven process for engineering a toolset for a formal method , 2011, Softw. Pract. Exp..

[11]  Satoru Izumi,et al.  Using the Model Checker Spin for Web Application Design , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.

[12]  Dana Petcu,et al.  MODAClouds: A model-driven approach for the design and execution of applications on multiple Clouds , 2012, 2012 4th International Workshop on Modeling in Software Engineering (MISE).

[13]  Dimitrios Kouzapas,et al.  Type Checking Privacy Policies in the π-calculus , 2015, FORTE.

[14]  Roxana-Maria Chelemen Modeling a Web Application for Cloud Content Adaptation with ASMs , 2013, 2013 International Conference on Cloud Computing and Big Data.

[15]  May Haydar,et al.  A formal approach for run-time verification of web applications using scope-extended LTL , 2013, Inf. Softw. Technol..

[16]  James Riely,et al.  Resource Access Control in Systems of Mobile Agents , 2002, HLCL.

[17]  Jorge Lobo,et al.  An obligation model bridging access control policies and privacy policies , 2008, SACMAT '08.

[18]  Paolo Arcaini,et al.  AsmetaSMV: A Way to Link High-Level ASM Models to Low-Level NuSMV Specifications , 2010, ASM.

[19]  David J. DeWitt,et al.  X-Diff: an effective change detection algorithm for XML documents , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[20]  Ying Liu,et al.  A static compliance-checking framework for business process models , 2007, IBM Syst. J..

[21]  Angelo Gargantini,et al.  A Scenario-Based Validation Language for ASMs , 2008, ABZ.

[22]  Angelo Gargantini,et al.  A Metamodel-based Language and a Simulation Engine for Abstract State Machines , 2008, J. Univers. Comput. Sci..

[23]  Michael Carl Tschantz,et al.  Formalizing and Enforcing Purpose Restrictions in Privacy Policies , 2012, 2012 IEEE Symposium on Security and Privacy.

[24]  Constance L. Heitmeyer,et al.  On the Need for Practical Formal Methods , 1998, FTRTFT.

[25]  Michael Carl Tschantz,et al.  Formal Methods for Privacy , 2009, FM.

[26]  Mark Ryan,et al.  Model Checking Agent Knowledge in Dynamic Access Control Policies , 2013, TACAS.

[27]  Francesco Tiezzi,et al.  Regulating data exchange in service oriented applications , 2007, FSEN'07.

[28]  Julian Rathke,et al.  safeDpi: a language for controlling mobile code , 2005, Acta Informatica.

[29]  Egon Börger,et al.  Abstract State Machines. A Method for High-Level System Design and Analysis , 2003 .