Sciweavers

1288 search results - page 169 / 258
» Securing aspect composition
Sort
View
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 11 months ago
Integrating identity-based cryptography in IMS service authentication
Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the r...
Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossa...
EUROSYS
2007
ACM
14 years 7 months ago
Macroprogramming heterogeneous sensor networks using cosmos
In this paper, we present COSMOS, a novel architecture for macroprogramming heterogeneous sensor network systems. Macroprogramming entails aggregate system behavior specification...
Asad Awan, Suresh Jagannathan, Ananth Grama
ICLP
2004
Springer
14 years 4 months ago
Applying CLP to Predict Extra-Functional Properties of Component-Based Models
A component is the basic re-usable unit of composition to build composite systems by connecting to others through their provided and required ports. Checking the functional complia...
Olivier Defour, Jean-Marc Jézéquel, ...
IJIPT
2006
127views more  IJIPT 2006»
13 years 10 months ago
Distribution concerns in service-oriented modelling
Service-oriented development offers a novel architectural approach that addresses crucial characteristics of modern business process development such as dynamic evolution, intra- ...
Nasreddine Aoumeur, José Luiz Fiadeiro, Cri...
WWW
2010
ACM
14 years 5 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...