Sciweavers

671 search results - page 80 / 135
» A Modeling Framework for Generating Security Protocol Specif...
Sort
View
SERP
2004
15 years 1 months ago
Formal Analysis of UML-Based Designs
This paper describes a design specification and analysis framework to support the OO design stage. Structural and behavioral specifications of objects are integrated and formalize...
Boumediene Belkhouche, Anastasia Nix
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
15 years 4 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
JUCS
2008
165views more  JUCS 2008»
14 years 11 months ago
A Product Derivation Tool Based on Model-Driven Techniques and Annotations
: In this paper, we present a model-based tool for product derivation. Our tool is centered on the definition of three models (feature, architecture and configuration models) which...
Elder Cirilo, Uirá Kulesza, Carlos Jos&eacu...
WOSP
2010
ACM
15 years 4 months ago
A framework for utility-based service oriented design in SASSY
The architecture of a software system has a significant impact on its quality of service (QoS) as measured by several performance metrics such as execution time, availability, th...
Daniel A. Menascé, John M. Ewing, Hassan Go...
STOC
2009
ACM
91views Algorithms» more  STOC 2009»
16 years 12 days ago
Inaccessible entropy
We put forth a new computational notion of entropy, which measures the (in)feasibility of sampling high entropy strings that are consistent with a given protocol. Specifically, we...
Iftach Haitner, Omer Reingold, Salil P. Vadhan, Ho...