Sciweavers

418 search results - page 29 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
DAIS
2003
13 years 10 months ago
Jironde: A Flexible Framework for Making Components Transactional
Abstract. It is generally agreed that one of the key services of componentbased systems are transactions. However, an agreement on how components should be involved in transactions...
Marek Prochazka
SOCO
2007
Springer
14 years 2 months ago
Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures
In component based software engineering, an application is build by composing trusted and reusable units of execution, the components. A composition is formed by connecting the com...
Dietmar Schreiner, Karl M. Göschka
ISI
2004
Springer
14 years 2 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
JLP
2008
129views more  JLP 2008»
13 years 8 months ago
Program and proof optimizations with type systems
We demonstrate a method for describing data-flow analyses based program optimizations as compositional type systems with a transformation component. Analysis results are presented...
Ando Saabas, Tarmo Uustalu
SIGMETRICS
2008
ACM
13 years 8 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov