Sciweavers

8644 search results - page 53 / 1729
» On the Composition of Secure Systems
Sort
View
PRDC
2008
IEEE
14 years 2 months ago
Indirect Control Path Analysis and Goal Coverage Strategies for Elaborating System Safety Goals in Composite Systems
Correctly specifying requirements for composite systems is essential to system safety, particularly in a distributed development environment. Goal-oriented requirements engineerin...
Jennifer Black, Philip Koopman
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
ICIW
2007
IEEE
14 years 2 months ago
QoS Composition of Services for Data-Intensive Application
— Service-Oriented Computing (SOC) is a promising means to integrate heterogeneous systems. Services from different providers can be integrated into a composite service regardles...
Antonio Bucchiarone, Luigi Presti
DEBU
2002
144views more  DEBU 2002»
13 years 7 months ago
Definition and Execution of Composite Web Services: The SELF-SERV Project
Web services composition is emerging as a promising technology for the effective automation of businessto-business collaborations. It allows organizations to form alliances by con...
Boualem Benatallah, Marlon Dumas, Zakaria Maamar
DSN
2009
IEEE
14 years 2 months ago
System safety as an emergent property in composite systems
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA...
Jennifer Black, Philip Koopman