Sciweavers

361 search results - page 18 / 73
» Composition of Password-Based Protocols
Sort
View
ATAL
2003
Springer
14 years 1 months ago
A formal compositional model of multiagent interaction
Interaction protocols for multiagent systems have been described diagrammatically in an extension of UML called AUML (Agent UML). In this paper, we show how to translate these pro...
Sea Ling, Seng Wai Loke
IEEESCC
2006
IEEE
14 years 2 months ago
Business Process Adaptations via Protocols
Business process management in service-oriented computing (SOC) environments poses special challenges. In particular, SOC environments are dynamic, thereby requiring frequent chan...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh
FOSSACS
2008
Springer
13 years 10 months ago
Compositional Methods for Information-Hiding
Protocols for information-hiding often use randomized primitives to obfuscate the link between the observables and the information to be protected. The degree of protection provide...
Christelle Braun, Konstantinos Chatzikokolakis, Ca...
WOA
2010
13 years 6 months ago
Towards a Flexible Development Framework for Multi-Agent Systems
In this paper, we present a software framework, called HDS (Heterogeneous Distributed System), that tries to simplify the realization of distributed applications and, in particular...
Agostino Poggi
CSFW
2008
IEEE
13 years 10 months ago
A Correctness Proof of a Mesh Security Architecture
The IEEE 802.11s working group is tasked to provide ways of establishing and securing a wireless mesh network. One proposal establishes a Mesh Security Architecture (MSA), with a ...
Doug Kuhlman, Ryan Moriarty, Tony Braskich, Steve ...