Sciweavers

418 search results - page 7 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
ACTA
2004
86views more  ACTA 2004»
13 years 8 months ago
Specification transformers: a predicate transformer approach to composition
Abstract. This paper explores theories that help in (i) proving that a system composed from components satisfies a system specification given only specifications of components and ...
Michel Charpentier, K. Mani Chandy
JSW
2007
134views more  JSW 2007»
13 years 8 months ago
Compositional Patterns of Non-Functional Properties for Contract Negotiation
— Providing powerful and fine-grained capabilities for the analysis and management of non-functional properties is a major challenge for component-based software systems. This a...
Hervé Chang, Philippe Collet
CBSE
2006
Springer
14 years 18 days ago
Verification of Component-Based Software Application Families
We present a novel approach which facilitates formal verification of component-based software application families using model checking. This approach enables effective composition...
Fei Xie, James C. Browne
TSE
2010
120views more  TSE 2010»
13 years 7 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
CCR
2004
147views more  CCR 2004»
13 years 8 months ago
Safe compositional specification of networking systems
The science of network service composition has emerged as one of the grand themes of networking research [17] as a direct result of the complexity and sophistication of emerging n...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...