Sciweavers

4305 search results - page 45 / 861
» Analysing Protocol Implementations
Sort
View
WOSP
2005
ACM
14 years 2 months ago
Modeling the performance of a NAT/firewall network service for the IXP2400
The evolution towards IP-aware access networks creates the possibility (and, indeed, the desirability) of additional network services, like firewalling or NAT, integrated into th...
Tom Verdickt, Wim Van de Meerssche, Koert Vlaeminc...
CBSE
2008
Springer
13 years 10 months ago
Life-Cycle Aware Modelling of Software Components
Current software component models insufficiently reflect the different stages of component life-cycle, which involves design, implementation, deployment, and runtime. Therefore, re...
Heiko Koziolek, Steffen Becker, Jens Happe, Ralf R...
LCN
1996
IEEE
14 years 29 days ago
A Class-Chest for Deriving Transport Protocols
Development of new transport protocols or protocol algorithms suffers from the complexity of the envir onment in which they ar e intended to run. Modeling techniques attempt to av...
W. Timothy Strayer
IJNSEC
2008
118views more  IJNSEC 2008»
13 years 8 months ago
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols, many protocol designers fail to provide any proof ...
Kim-Kwang Raymond Choo
UML
2001
Springer
14 years 1 months ago
RIGR - A Repository Model Based Approach to Management
: Organizations with large integrated computer-based systems are often faced with the challenge of evolving their mission-critical systems in a manner that maximizes reuse opportun...
Ray Trask, Robert B. France