Sciweavers

1288 search results - page 27 / 258
» Securing aspect composition
Sort
View
ECOOP
2007
Springer
14 years 3 months ago
Towards correct evolution of components using VPA-based aspects
Abstract. Interaction protocols are a popular means to construct correct component-based systems. Aspects that modify such protocols are interesting in this context because they su...
Dong Ha Nguyen, Mario Südholt
CCS
2000
ACM
14 years 1 months ago
Composition and integrity preservation of secure reactive systems
We consider compositional properties of reactive systems that are secure in a cryptographic sense. We follow the wellknown simulatability approach, i.e., the specification is an ...
Birgit Pfitzmann, Michael Waidner
ENTCS
2006
145views more  ENTCS 2006»
13 years 9 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
PERCOM
2006
ACM
14 years 8 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
BPM
2008
Springer
174views Business» more  BPM 2008»
13 years 11 months ago
A Framework for Dependency Based Automatic Service Composition
Abstract. Developing service based complex applications (service composition) has become an important area of research in SOA. In spite of this, there has been little effort to und...
Abrehet M. Omer, Alexander Schill