Sciweavers

8644 search results - page 30 / 1729
» On the Composition of Secure Systems
Sort
View
TRIDENTCOM
2010
IEEE
13 years 5 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
FMOODS
2006
13 years 9 months ago
Security Issues in Service Composition
Abstract. We use a distributed, enriched -calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
JCS
2007
141views more  JCS 2007»
13 years 7 months ago
Compositional information flow security for concurrent programs
We present a general unwinding framework for the definition of information flow security properties of concurrent programs, described in a simple imperative language enriched wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
ICTCS
2003
Springer
14 years 26 days ago
Compositional Verification of Secure Streamed Data: A Case Study with EMSS
Fabio Martinelli, Marinella Petrocchi, Anna Vaccar...