Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
We propose a middleware for automated implementation of security protocols for Web services. The proposed middleware consists of two main layers: the communication layer and the se...
Composing web services using current web service composition languages (such as BPEL) requires a large amount of in-depth knowledge. This paper introduces a service creation envir...
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...