Sciweavers

1288 search results - page 58 / 258
» Securing aspect composition
Sort
View
WICSA
2004
13 years 10 months ago
Compositional Generation of Software Architecture Performance QN Models
Early performance analysis based on Queueing Network Models (QNM) has been often proposed to support software designers during the software development process. These approaches a...
Antinisca Di Marco, Paola Inverardi
SEFM
2009
IEEE
14 years 3 months ago
Modal Contracts for Component-Based Design
—Contracts and their composition may be used with different goals in a component-based design flow: on the one hand, a component contract describes the guarantees a component is...
Gregor Goessler, Jean-Baptiste Raclet
IACR
2011
84views more  IACR 2011»
12 years 8 months ago
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
In this paper, we explore a general methodology for converting composite order pairingbased cryptosystems into the prime order setting. We employ the dual pairing vector space app...
Allison B. Lewko
CSFW
1992
IEEE
14 years 1 months ago
Causal Security
This paper gives a new definition of Security, which takes causal information into account. The new definition can be used to determine the security of nondeterministic concurrent...
Miranda Mowbray
CSFW
1995
IEEE
14 years 18 days ago
Composing and decomposing systems under security properties
We investigate the formal relationship between separability of processes and the types of non-interference properties they enjoy. Though intuitively appealing, separability – th...
A. W. Roscoe, L. Wulf