a |

access control | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |

Access Control Policy | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems |

approximation | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |

Asynchronous testing | Asynchronous testing of real-time systems |

c |

completeness | Asynchronous testing of real-time systems |

component-based software engineering | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage |

computational origami | Origami folds in higher-dimension |

Controlled rewrite system | Transforming Prefix-constrained or Controlled Rewrite Systems |

correct-by-construction | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |

d |

distributed algorithm | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |

dynamic logic | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |

e |

enumeration problem | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |

Euclidean geometry | Origami folds in higher-dimension |

Event-B | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |

expression problem | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage |

f |

FDD | Automatic detection and correction of firewall misconfigurations- A formal approach |

Feature-Oriented Programming | Integration of a Decentralised Pattern Matching: Venue for a New Paradigm Intermarriage |

Firewall | Automatic detection and correction of firewall misconfigurations- A formal approach |

formal analysis | A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |

Formal Verification and Validation | A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |

Fuzzy Extractor | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |

g |

geometric modeling | Origami folds in higher-dimension |

h |

Higher dimensional geometry | Origami folds in higher-dimension |

Hoare logic | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |

i |

Information Systems Security | A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |

l |

Local computations | Formal Development of Distributed Enumeration Algorithms By Refinement-Based Techniques |

m |

mathematical origami | Origami folds in higher-dimension |

Misconfiguration | Automatic detection and correction of firewall misconfigurations- A formal approach |

Mobile Social Networks | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |

multi-threading | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |

p |

parallel model checking | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |

predicate logic | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |

Prefix-constrained rewrite system | Transforming Prefix-constrained or Controlled Rewrite Systems |

Privacy | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |

program verification | C2PDLS: A Combination of Combinatory and Converse PDL with Substitutions |

proximity | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |

r |

Risk | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems |

risk assessment | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment |

risk management | Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems |

runtime verification | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |

s |

social profile | Private Profile Matching for Mobile Social Networks Based on Fuzzy Extractors |

soundness | Asynchronous testing of real-time systems |

space complexity | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |

Stream Monitoring | Measuring the Gap: Algorithmic Approximation Bounds for the Space Complexity of Stream Specifications |

symbolic reachability | A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems |

Synchronous testing | Asynchronous testing of real-time systems |

t |

term rewriting | Transforming Prefix-constrained or Controlled Rewrite Systems |

termination | Transforming Prefix-constrained or Controlled Rewrite Systems |

test generation | Asynchronous testing of real-time systems |