Sciweavers

ACSD
2009
IEEE
106views Hardware» more  ACSD 2009»
13 years 7 months ago
Specification Enforcing Refinement for Convertibility Verification
Protocol conversion deals with the automatic synthesis of an additional component, often referred to as an adaptor or a converter, to bridge mismatches between interacting compone...
Partha S. Roop, Alain Girault, Roopak Sinha, Grego...
SRDS
2003
IEEE
13 years 9 months ago
Appia vs. Cactus: Comparing Protocol Composition Frameworks
The paper presents and compares Appia and Cactus, two frameworks for protocol composition. The comparison is based on the experience gained in implementing a faulttolerant Atomic ...
Sergio Mena, Xavier Cuvellier, Christophe Gr&eacut...
IEEESCC
2006
IEEE
13 years 10 months ago
Business Process Adaptations via Protocols
Business process management in service-oriented computing (SOC) environments poses special challenges. In particular, SOC environments are dynamic, thereby requiring frequent chan...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh
IFIP
2009
Springer
13 years 11 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman