Sciweavers

2106 search results - page 108 / 422
» Specifying C concepts
Sort
View
SEFM
2007
IEEE
14 years 4 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
WISE
2007
Springer
14 years 4 months ago
Modeling Distributed Events in Data-Intensive Rich Internet Applications
Abstract. Rich Internet applications (RIAs) enable novel usage scenarios by overcoming the traditional paradigms of Web interaction. Conventional Web applications can be seen as re...
Giovanni Toffetti Carughi, Sara Comai, Alessandro ...
ESWS
2007
Springer
14 years 4 months ago
Semantic EPC: Enhancing Process Modeling Using Ontology Languages
Abstract. In this article we describe a semantic extension of event-driven process chains, with which it is possible to specify the semantics of individual model elements as it is ...
Oliver Thomas, Michael Fellmann
ICWE
2007
Springer
14 years 4 months ago
Modeling Data-intensive Rich Internet Applications with Server Push Support
Abstract. Rich Internet applications (RIAs) enable novel usage scenarios by overcoming the traditional paradigms of Web interaction. Conventional Web applications can be seen as re...
Giovanni Toffetti Carughi
COMPSAC
2006
IEEE
14 years 4 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev