Sciweavers

1288 search results - page 28 / 258
» Securing aspect composition
Sort
View
PERCOM
2010
ACM
13 years 7 months ago
ReSCo: A middleware component for Reliable Service Composition in pervasive systems
Abstract—Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as th...
Brent Lagesse, Mohan Kumar, Matthew Wright
NCA
2005
IEEE
14 years 2 months ago
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
CSFW
1999
IEEE
14 years 1 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
OOPSLA
2009
Springer
14 years 1 months ago
The operation recorder: specifying model refactorings by-example
Predefined composite operations are handy for efficient software modeling, e.g., for the automatic execution of refactor
Petra Brosch, Martina Seidl, Konrad Wieland, Manue...
COMPSAC
2003
IEEE
14 years 2 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han