Sciweavers

ASWEC
2006
IEEE
13 years 10 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
ASWEC
2006
IEEE
13 years 10 months ago
Over-the-air Deployment of Applications in Multi-Platform Environments
Over-the-air (OTA) delivery of applications is important to support as it enables easy deployment and upgrades to applications, thereby reducing the disrupting effect which instal...
Tore Fjellheim
ASWEC
2006
IEEE
13 years 10 months ago
A Runtime Monitoring and Validation Framework for Web Service Interactions
Web services are designed for composition and use by third parties through dynamic discovery. As such, the issue of interoperability between services is of great importance to ens...
Zheng Li, Yan Jin, Jun Han
ASWEC
2006
IEEE
13 years 10 months ago
An Empirically-Based Criterion for Determining the Success of an Open-Source Project
In order to determine a success criterion for open-source software projects, we analyzed 122,205 projects in the SourceForge database. There were 80,597 projects with no downloads...
Dror G. Feitelson, Gillian Z. Heller, Stephen R. S...
ASWEC
2006
IEEE
13 years 10 months ago
An agent-oriented approach to change propagation in software evolution
Software maintenance and evolution are inevitable activities since almost all software that is useful and successful stimulates user-generated requests for change and improvements...
Khanh Hoa Dam, Michael Winikoff, Lin Padgham
ASWEC
2006
IEEE
13 years 10 months ago
Derivation of Java Monitors
This paper describes the formalisation of Java thread synchronisation in an extended Owicki-Gries theory, which facilitates the proof of safety and progress properties of multi-th...
Brijesh Dongol
ASWEC
2006
IEEE
13 years 10 months ago
Assessing Security Properties of Software Components: A Software Engineer's Perspective
The paper proposes an assessment scheme for the security properties of software components. The proposed scheme consists of three stages: (i) a system-specific security requireme...
Khaled M. Khan, Jun Han
ASWEC
2006
IEEE
13 years 10 months ago
Model-based runtime analysis of distributed reactive systems
Andreas Bauer 0002, Martin Leucker, Christian Scha...