Sciweavers

1288 search results - page 76 / 258
» Securing aspect composition
Sort
View
FORTE
2004
13 years 11 months ago
A Construction Kit for Modeling the Security of M-commerce Applications
Abstract. In this article we present a method to avoid security problems in modern m-commerce applications. The security problems that we are addressing are breaches of security du...
Dominik Haneberg, Wolfgang Reif, Kurt Stenzel
ASE
2007
121views more  ASE 2007»
13 years 10 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone
LATA
2009
Springer
14 years 5 months ago
A Cryptosystem Based on the Composition of Reversible Cellular Automata
We present conditions which guarantee that a composition of marker cellular automata has the same neighbourhood as each of the individual components. We show that, under certain te...
Adam Clarridge, Kai Salomaa
CORR
2011
Springer
188views Education» more  CORR 2011»
13 years 5 months ago
Composition of Management System for Smart Homes
—The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm...
Mark Sh. Levin, Aliaksei Andrushevich, Alexander K...
FASE
2007
Springer
14 years 4 months ago
Software Product Families: Towards Compositionality
- Static Analysis and Abstract Interpretation I (Chair: Sophia Drossopulou, room: Multicert) • FASE - Specification (Chair: Marsha Chechik, room: Cisco) • TACAS - Specificati...
Jan Bosch