Sciweavers

1527 search results - page 30 / 306
» From Requirements to Design: Formalizing the Key Steps
Sort
View
ER
1998
Springer
123views Database» more  ER 1998»
13 years 12 months ago
From Object Oriented Conceptual Modeling to Automated Programming in Java
The development of Internet commercial applications and corporate Intranets around the world, which uses Java as the de facto standard language, is a significant topic in modern S...
Oscar Pastor, Vicente Pelechano, Emilio Insfr&aacu...
IJNSEC
2006
110views more  IJNSEC 2006»
13 years 7 months ago
Password-based Encrypted Group Key Agreement
This paper presents an efficient password-based authenticated encrypted group key agreement protocol immune to dictionary attack under the computation Diffie-Hellman (CDH) assumpt...
Ratna Dutta, Rana Barua
DSRT
2008
IEEE
14 years 2 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
AWIC
2003
Springer
14 years 28 days ago
Secure Intelligent Agents Based on Formal Description Techniques
This paper describes a practical solution for the incorporation of security services in agents. From a set of basic user requirements, the agents will be able to find out the best ...
L. Mengual, C. de la Puente
SCP
2002
112views more  SCP 2002»
13 years 7 months ago
Formal agent-oriented modeling with UML and graph transformation
The agent paradigm can be seen as an extension of the notion of (active) objects by concepts like autonomy and cooperation. Mainstream object-oriented modeling techniques do not a...
Ralph Depke, Reiko Heckel, Jochen Malte Küste...