Sciweavers

899 search results - page 69 / 180
» Using Method Engineering for the Construction of Agent-Orien...
Sort
View
PLDI
2006
ACM
14 years 2 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
EUROMICRO
2009
IEEE
14 years 3 months ago
Using Design Patterns for Refactoring Real-World Models
— Many software development methodologies are based on modeling the real world. In some of these methodologies, real-world models are gradually transformed into software models, ...
Hamed Yaghoubi Shahir, Ehsan Kouroshfar, Raman Ram...
SAC
2002
ACM
13 years 8 months ago
A modular approach to build structured event-based systems
Event-based systems are developed and used as a coordination model to integrate components in loosely coupled systems. Research and product development focused so far on efficienc...
Ludger Fiege, Gero Mühl, Felix C. Gärtne...
TII
2010
166views Education» more  TII 2010»
13 years 3 months ago
Source-to-Source Architecture Transformation for Performance Optimization in BIP
Behavior, Interaction, Priorities (BIP) is a component framework for constructing systems from a set of atomic components by using two kinds of composition operators: interactions ...
Marius Bozga, Mohamad Jaber, Joseph Sifakis
EUROCRYPT
2010
Springer
14 years 1 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...