SCSS 2017 Volume Information
Volume:Mohamed Mosbah and Michael Rusinowitch (editors)
SCSS 2017. The 8th International Symposium on Symbolic Computation in Software Science 2017

SCSS 2017 Volume Information

Title:SCSS 2017. The 8th International Symposium on Symbolic Computation in Software Science 2017
Editors:Mohamed Mosbah and Michael Rusinowitch
Series:EPiC Series in Computing
Volume:45
Publication date:March 26, 2017

Papers

AuthorsTitlePagesPDF
David Cerna and Wolfgang SchreinerMeasuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications1-15
Seyed Hossein Haeri and Sibylle SchuppIntegration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage16-28
Jon Hael Brenas, Rachid Echahed and Martin StreckerC2PDLS: A Combination of Combinatory and Converse PDL with Substitutions29-41
Puneet BhatejaAsynchronous testing of real-time systems42-48
Nirina Andrianarivelo, Vivien Pelletier and Pierre RétyTransforming Prefix-constrained or Controlled Rewrite Systems49-62
Jaweher Zouari, Mohamed Hamdi and Tai-Hoon KimPrivate Profile Matching for Mobile Social Networks Based on Fuzzy Extractors63-67
Amina Saâdaoui, Nihel Ben Youssef and Adel BouhoulaAutomatic detection and correction of firewall misconfigurations- A formal approach68-76
Pierrette Annie Evina, Faten Labbene Ayachi, Faouzi Jaidi and Adel BouhoulaTowards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems77-82
Tetsuo Ida and Stephen WattOrigami folds in higher-dimension83-95
Maha Boussabbeh, Mohamed Tounsi, Ahmed Hadj Kacem and Mohamed Mosbah Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques96-106
Hiba Ouni, Kais Klai, Chiheb Ameur Abid and Belhassen ZouariA Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems107-119
Faouzi Jaidi, Faten Labbene Ayachi and Adel BouhoulaA Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment120-132

Keyphrases

CountKeyphrase
2access control, risk assessment
1access control policy, approximation, asynchronous testing, completeness, component based software engineering, computational origami, controlled rewrite system, correct by construction, distributed algorithm, dynamic logic, enumeration problem, euclidean geometry, event b, expression problem, fdd, feature oriented programming, firewall, formal analysis, formal verification and validation, fuzzy extractor, geometric modeling, higher dimensional geometry, hoare logic, information systems security, local computations, mathematical origami, misconfiguration, mobile social networks, multi threading, parallel model checking, predicate logic, prefix constrained rewrite system, privacy, program verification, proximity, risk, risk management, runtime verification, social profile, soundness, space complexity, stream monitoring, symbolic reachability, synchronous testing, term rewriting, termination, test generation