Sciweavers

793 search results - page 53 / 159
» Protocol Modeling with Model Program Composition
Sort
View
ICALP
2001
Springer
14 years 9 days ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale
PADS
1999
ACM
14 years 4 days ago
Performance Prediction Tools for Parallel Discrete-Event Simulation
We have developed a set of performance prediction tools which help to estimate the achievable speedups from parallelizing a sequential simulation. The tools focus on two important...
Chu-Cheow Lim, Yoke-Hean Low, Boon-Ping Gan, Sanja...
BTW
2005
Springer
177views Database» more  BTW 2005»
14 years 1 months ago
Composing Web Services Specifications: Experiences in Implementing Policy-Driven Transactional Processes
: The Web Services architecture defines various specifications that applications may wish to use in combination. In this paper, we investigate the composition of the Web services s...
Stefan Tai
JALC
2006
87views more  JALC 2006»
13 years 7 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
JUCS
2008
162views more  JUCS 2008»
13 years 7 months ago
Composition and Run-time Adaptation of Mismatching Behavioural Interfaces
Abstract: Reuse of software entities such as components or Web services raise composition issues since, most of the time, they present mismatches in their interfaces. These mismatc...
Javier Cámara, Gwen Salaün, Carlos Can...