Sciweavers

1179 search results - page 22 / 236
» Should Superclasses be Abstract
Sort
View
ADAEUROPE
2007
Springer
14 years 1 months ago
Modelling Remote Concurrency with Ada
When developing concurrent software, a proper engineering practice is to choose a good level of abstraction for expressing concurrency control. Ideally, this level should provide p...
Claude Kaiser, Christophe Pajault, Jean-Fran&ccedi...
ESORICS
2002
Springer
14 years 7 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
CAISE
2009
Springer
14 years 2 months ago
P2S: A Methodology to Enable Inter-organizational Process Design through Web Services
Abstract. With the advent of Service Oriented Architecture organizations have experienced services as a platform-independent technology to develop and use simple internal applicati...
Devis Bianchini, Cinzia Cappiello, Valeria De Anto...
IFIP
2009
Springer
14 years 2 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman
IFM
2009
Springer
158views Formal Methods» more  IFM 2009»
14 years 2 months ago
Developing Topology Discovery in Event-B
Abstract. We present a formal development in Event-B of a distributed topology discovery algorithm. Distributed topology discovery is at the core of several routing algorithms and ...
Thai Son Hoang, Hironobu Kuruma, David A. Basin, J...