Sciweavers

418 search results - page 13 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
CSFW
2012
IEEE
11 years 11 months ago
Securing Interactive Programs
Abstract—This paper studies the foundations of informationflow security for interactive programs. Previous research assumes that the environment is total, that is, it must alway...
Willard Rafnsson, Daniel Hedin, Andrei Sabelfeld
JCS
2010
112views more  JCS 2010»
13 years 7 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
SERP
2003
13 years 10 months ago
3CoFramework: A Component-Based Framework for Distributed Applications
The software engineering community has introduced component and connector concepts to support architecture-based software descriptions. However, there still exists a gap in transi...
Shifeng Zhang, Steve Goddard
ICSE
2001
IEEE-ACM
14 years 1 months ago
Dynamic and Selective Combination of Extensions in Component-Based Applications
Support for dynamic and client-specific customization is required in many application areas. We present a (distributed) application as consisting of a minimal functional core – ...
Eddy Truyen, Bart Vanhaute, Wouter Joosen, Pierre ...
WADT
1998
Springer
14 years 13 days ago
An Algebra of Graph Derivations Using Finite (co-) Limit Double Theories
Graph transformation systems have been introduced for the formal specification of software systems. States are thereby modeled as graphs, and computations as graph derivations acco...
Andrea Corradini, Martin Große-Rhode, Reiko ...