Sciweavers

1777 search results - page 260 / 356
» Programming Cryptographic Protocols
Sort
View
IGPL
2010
117views more  IGPL 2010»
13 years 6 months ago
Executable specification of open multi-agent systems
Multi-agent systems where the agents are developed by parties with competing interests, and where there is no access to an agent's internal state, are often classified as `ope...
Alexander Artikis, Marek J. Sergot
PPNA
2011
12 years 11 months ago
Ad-hoc limited scale-free models for unstructured peer-to-peer networks
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
Durgesh Rani Kumari, Hasan Guclu, Murat Yuksel
SIGSOFT
2005
ACM
14 years 9 months ago
Lightweight object specification with typestates
Previous work has proven typestates to be useful for modeling protocols in object-oriented languages. We build on this work by addressing substitutability of subtypes as well as i...
Kevin Bierhoff, Jonathan Aldrich
NORDSEC
2009
Springer
14 years 3 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
EDCC
2005
Springer
14 years 2 months ago
Novel Generic Middleware Building Blocks for Dependable Modular Avionics Systems
Abstract. The A3M project aimed to define basic building blocks of a middleware meeting both dependability and real-time requirements for a wide range of space systems and applicat...
Christophe Honvault, Marc Le Roy, Pascal Gula, Jea...