Sciweavers

53 search results - page 4 / 11
» Extended Description Techniques for Security Engineering
Sort
View
ATC
2007
Springer
14 years 1 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...
ESORICS
2008
Springer
13 years 9 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
OTM
2007
Springer
14 years 1 months ago
Compiler Assisted Elliptic Curve Cryptography
Abstract. Although cryptographic implementation tasks are often undertaken by expert programmers, a plethora of performance and security driven options, as well as more mundane sof...
Manuel Barbosa, Andrew Moss, Dan Page
OOPSLA
2004
Springer
14 years 22 days ago
A language-independent approach to software maintenance using grammar adapters
A long-standing goal of software engineering is to construct software that is easily modified and extended. Recent advances in software design techniques, such as aspect-oriented ...
Suman Roychoudhury
APSEC
1999
IEEE
13 years 11 months ago
Sequence Operators: Specifying Behavioral Interfaces of Smalltalk Blocks
The ability to treat code as data within a programming language is a powerful feature. Smalltalk introduces an object called a block that represents code as data. We propose a for...
Yoonsik Cheon, Heung-Nam Kim