Sciweavers

5722 search results - page 114 / 1145
» Security Function Interactions
Sort
View
CSFW
1999
IEEE
14 years 1 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
COMPSEC
2000
112views more  COMPSEC 2000»
13 years 8 months ago
Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture
paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of ...
Stefanos Gritzalis, Sokratis K. Katsikas, Dimitrio...
ICFEM
2005
Springer
14 years 2 months ago
A Compositional Framework for Service Interaction Patterns and Interaction Flows
We provide precise high-level models for eight fundamental service interaction patterns, together with schemes for their composition into complex service-based business process int...
Alistair P. Barros, Egon Börger
GPCE
2008
Springer
13 years 10 months ago
Program refactoring using functional aspects
A functional aspect is an aspect that has the semantics of a transformation; it is a function that maps a program to an advised program. Functional aspects are composed by functio...
Sven Apel, Christian Kästner, Don S. Batory
CHI
1998
ACM
14 years 1 months ago
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems
The Cognitive Function Analysis is a methodology supportedby a mediating tool for the human-centered automationof safety-critical systems[4]. It is basedon a socio-cognitive model...
Guy A. Boy