Sciweavers

1288 search results - page 63 / 258
» Securing aspect composition
Sort
View
CSFW
2004
IEEE
14 years 24 days ago
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
Michael Backes, Birgit Pfitzmann
SCP
2010
126views more  SCP 2010»
13 years 7 months ago
Component simulation-based substitutivity managing QoS and composition issues
Several scientic bottlenecks have been identied in existing component-based approaches. em, we focus on the identication of a relevant abstraction for the component expression ...
Pierre-Cyrille Héam, Olga Kouchnarenko, J&e...
ISCC
2007
IEEE
14 years 3 months ago
Composition for Enhanced SIP Presence
Presence has taken shape as a way to present a comprehensive view of the communications capabilities of a user or resource. Standardized protocols allow for receiving presence dat...
Ron Shacham, Wolfgang Kellerer, Henning Schulzrinn...
TAMODIA
2004
13 years 10 months ago
Towards a composite modelling approach for multitasking
Much information and knowledge work (with and without information technology) can be characterised as multitasking and interrupt driven. A whole host of characterisations and buzz...
Peter J. Wild, Peter Johnson, Hilary Johnson
ECBS
2002
IEEE
146views Hardware» more  ECBS 2002»
14 years 2 months ago
Top-Down Composition of Software Architectures
This paper discusses an approach for top-down composition of software architectures. First, an architecture is derived that addresses functional requirements only. This architectu...
Hans de Bruin, Hans van Vliet