Sciweavers

8644 search results - page 69 / 1729
» On the Composition of Secure Systems
Sort
View
CAISE
2007
Springer
14 years 1 months ago
Specification and Verification of Authorization Policies for Web Services Composition
The management and maintenance of a large number of Web services is not easy and, in particular, needs appropriate authorization policies to be defined so as to realize reliable an...
Mohsen Rouached, Claude Godart
OOPSLA
1999
Springer
14 years 1 months ago
Compositional Pointer and Escape Analysis for Java Programs
This paper presents a combined pointer and escape analysis algorithm for Java programs. The algorithm is based on the abstraction of points-to escape graphs, which characterize ho...
John Whaley, Martin C. Rinard
ASIACRYPT
2010
Springer
13 years 7 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
CONCUR
2001
Springer
14 years 1 months ago
Compositional Methods for Probabilistic Systems
Abstract. We present a compositional trace-based model for probabilistic systems. The behavior of a system with probabilistic choice is a stochasticprocess, namely, a probability d...
Luca de Alfaro, Thomas A. Henzinger, Ranjit Jhala
JLP
2006
126views more  JLP 2006»
13 years 9 months ago
Compositional modeling and refinement for hierarchical hybrid systems
In this paper, we develop a theory of modular design and refinement of hierarchical hybrid systems. In particular, we present compositional trace-based semantics for the language ...
Rajeev Alur, Radu Grosu, Insup Lee, Oleg Sokolsky