Sciweavers

73 search results - page 10 / 15
» CPAM, A Protocol for Software Composition
Sort
View
FSTTCS
2009
Springer
15 years 4 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
FSTTCS
2003
Springer
15 years 2 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann
OTM
2007
Springer
15 years 3 months ago
Property-Preserving Evolution of Components Using VPA-Based Aspects
Abstract. Protocols that govern the interactions between software components are a popular means to support the construction of correct component-based systems. Previous studies ha...
Dong Ha Nguyen, Mario Südholt
EUROMICRO
2009
IEEE
15 years 1 months ago
Service Redundancy Strategies in Service-Oriented Architectures
Redundancy can improve the availability of components in service-oriented systems. However, predicting and quantifying the effects of different redundancy strategies can be a comp...
Nicholas R. May, Heinz W. Schmidt, Ian E. Thomas
ASWEC
2006
IEEE
15 years 3 months ago
A Runtime Monitoring and Validation Framework for Web Service Interactions
Web services are designed for composition and use by third parties through dynamic discovery. As such, the issue of interoperability between services is of great importance to ens...
Zheng Li, Yan Jin, Jun Han