This paper deals with the problem of automatically and correctly control...
Effectively specifying and implementing robotic missions pose a set of
c...
Smart contracts embody complex business processes that can be difficult ...
Smart contracts manage blockchain assets. While smart contracts embody
b...
Temporal synthesis attempts to construct reactive programs that satisfy ...
Privacy is currently in 'distress' and in need of 'rescue', much like
pr...
Recent regulations, such as the European General Data Protection Regulat...
This paper introduces a run-time mechanism for preventing leakage of sec...
Browser extensions are small applications executed in the browser contex...
Many important system properties, particularly in security and privacy,
...
This report presents the activities of the first working group of the CO...
Runtime verification is an area of formal methods that studies the dynam...
Data minimisation is a privacy enhancing principle, stating that persona...
A social network service is a platform to build social relations among p...
Our goal is to use formal methods to analyse normative documents written...
We are concerned with the analysis of normative texts - documents based ...