In a previous work we have presented a formal framework devoted to show the relevance of choreography and orchestration in the design of service oriented applications. Even if usef...
We identify different levels of conformance to a protocol (weak, exhaustive, and robust conformance) and show how conformance may be either checked a priori or enforced at runtim...
Ulrich Endriss, Nicolas Maudet, Fariba Sadri, Fran...
We consider the problem of statically verifying the conformance of the code of a system to an explicit authorization policy. In a distributed setting, some part of the system may ...
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
AbstractSelf-Assembly is a powerful autopoietic mechanism ubiquitous throughout the natural world. It may be found at the molecular scale and also at astronomical scales. Self-asse...