Sciweavers

202 search results - page 8 / 41
» Composing and decomposing systems under security properties
Sort
View
WORDS
2005
IEEE
14 years 2 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
SCL
2008
77views more  SCL 2008»
13 years 8 months ago
Integral Input to State Stable systems in cascade
The Integral Input to State Stability (iISS) property is studied is the context of nonlinear time-invariant systems in cascade. Some sufficient conditions for the preservation of ...
Antoine Chaillet, David Angeli
CCS
2003
ACM
14 years 1 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
RTA
1991
Springer
14 years 2 days ago
Completeness of Combinations of Constructor Systems
A term rewriting system is called complete if it is both confluent and strongly norrealizing. Barendregt and Klop showed that the disjoint union of complete term rewriting systems...
Aart Middeldorp, Yoshihito Toyama
IASTEDSEA
2004
13 years 10 months ago
Modeling and analyzing security protocols in SAM: A case study
: Secure distributed systems rely on secure information flow between different hosts, thus placing a heavy requirement on the underlying security protocols. In this paper, we use S...
Zhengfan Dai, Xudong He, Junhua Ding, Shu Gao