Sciweavers

671 search results - page 55 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
CSFW
2006
IEEE
15 years 7 months ago
Simulation-Based Security with Inexhaustible Interactive Turing Machines
Recently, there has been much interest in extending models for simulation-based security in such a way that the runtime of protocols may depend on the length of their input. Findi...
Ralf Küsters
SEFM
2005
IEEE
15 years 7 months ago
On Compatibility and Behavioural Substitutability of Component Protocols
Component Based Development (CBD) aims to facilitate the construction of large-scale applications by supporting the composition of simple building blocks into complex applications...
Nabil Hameurlain
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 6 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
EMISA
2005
Springer
15 years 7 months ago
A Model-Driven Approach for the Rapid Development of E-Negotiation Systems
: Most of today’s e-marketplaces support a single negotiation protocol. The protocol is usually built into the e-marketplace infrastructure, therefore if a new one is introduced ...
Morad Benyoucef, Stefanie Rinderle
JOT
2010
144views more  JOT 2010»
14 years 12 months ago
A Tool for Specifying and Validating Agents' Interaction Protocols: From Agent UML to Maude
To achieve the multi-agent systems’ goals, agents interact to exchange information, to cooperate and to coordinate their tasks. Interaction is generally recognized as an importa...
Farid Mokhati, Brahim Sahraoui, Soufiane Bouzaher,...