Sciweavers

5904 search results - page 167 / 1181
» Requirements for a Composition Language
Sort
View
LCN
2005
IEEE
15 years 9 months ago
Secure Content Delivery using Key Composition
In this paper, we propose a novel framework for secure multicast on overlay networks. Our contributions are threefold: 1) a technique key composition is proposed to cope with the ...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann...
EUROCRYPT
2006
Springer
15 years 7 months ago
Composition Implies Adaptive Security in Minicrypt
To prove that a secure key-agreement protocol exists one must at least show P = NP. Moreover any proof that the sequential composition of two non-adaptively secure pseudorandom fun...
Krzysztof Pietrzak
150
Voted
IM
2007
15 years 5 months ago
Towards Automatic Composition of Network Management Web Services
— Despite the automation in many domains, network management still requires a lot of manual interaction. With the ongoing rapid growth of the Internet and the number of connected...
Torsten Klie, Felix Gebhard, Stefan Fischer
125
Voted
CORR
2010
Springer
157views Education» more  CORR 2010»
15 years 1 months ago
Constraint-Guided Workflow Composition Based on the EDAM Ontology
Abstract. Methods for the automatic composition of services into executable workflows need detailed knowledge about the application domain, in particular about the available servic...
Anna-Lena Lamprecht, Stefan Naujokat, Bernhard Ste...
APN
2009
Springer
15 years 10 months ago
Compositional Service Trees
In the world of Service Oriented Architectures, one deals with networks of cooperating components. A component offers services; to deliver a service it possibly needs services of ...
Wil M. P. van der Aalst, Kees M. van Hee, Peter Ma...