Sciweavers

8644 search results - page 50 / 1729
» On the Composition of Secure Systems
Sort
View
ESAW
2000
Springer
13 years 11 months ago
Combining Software Components and Mobile Agents
We present a first approach that combines the mobile agent and the compositional paradigms into a new agent-based compositional model. The aim of this work is to explore the capabi...
Mercedes Amor, Mónica Pinto, Lidia Fuentes,...
HPDC
1996
IEEE
13 years 12 months ago
The Core Legion Object Model
This document describes the core Legion object model. The model specifies the composition and functionality of Legion's core objects--those objects that cooperate to create, ...
Michael J. Lewis, Andrew S. Grimshaw
FM
2008
Springer
130views Formal Methods» more  FM 2008»
13 years 9 months ago
Specification and Checking of Software Contracts for Conditional Information Flow
Abstract. Information assurance applications built according to the MILS (Multiple Independent Levels of Security) architecture often contain information flow policies that are con...
Torben Amtoft, John Hatcliff, Edwin Rodrígu...
SAC
2002
ACM
13 years 7 months ago
Agent factory: generative migration of mobile agents in heterogeneous environments
In most of today's agent systems migration of agents requires homogeneity in the programming language and/or agent platform in which an agent has been designed. In this paper...
Frances M. T. Brazier, Benno J. Overeinder, Maarte...
CCS
2007
ACM
14 years 1 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia