Sciweavers

31 search results - page 3 / 7
» On the protocol composition logic PCL
Sort
View
FOSSACS
2009
Springer
14 years 23 days ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
PODS
2006
ACM
122views Database» more  PODS 2006»
14 years 6 months ago
Verification of communicating data-driven web services
We study the verification of compositions of Web Service peers which interact asynchronously by exchanging messages. Each peer has access to a local database and reacts to user in...
Alin Deutsch, Liying Sui, Victor Vianu, Dayou Zhou
FORTE
2007
13 years 7 months ago
Specifying and Composing Interaction Protocols for Service-Oriented System Modelling
Abstract. We present and discuss a formal, high-level approach to the specification and composition of interaction protocols for service-oriented systems. This work is being develo...
João Abreu, Laura Bocchi, José Luiz ...
WICSA
2008
13 years 7 months ago
A Pattern-Based Approach to Development of Service Mediators for Protocol Mediation
Service composition is one of the key objectives for adopting Service Oriented Architecture. Today, web services, however, are not always perfectly compatible and composition mism...
Xitong Li, Yushun Fan, Jian Wang, Li Wang, Feng Ji...
BIRTHDAY
2006
Springer
13 years 9 months ago
Reasoning About Web Services in a Temporal Action Logic
The paper presents an approach to reasoning about Web services in a temporal action theory. Web services are described by specifying their interaction protocols in an action theory...
Alberto Martelli, Laura Giordano