Sciweavers

757 search results - page 11 / 152
» Composing Security-Aware Software
Sort
View
SSDBM
2002
IEEE
116views Database» more  SSDBM 2002»
15 years 2 months ago
A Conceptual Framework for Composing and Managing Scientific Data Lineage
Scientific research relies as much on the dissemination and exchange of data sets as on the publication of conclusions. Accurately tracking the lineage (origin and subsequent proc...
Rajendra Bose
CASCON
2010
166views Education» more  CASCON 2010»
14 years 8 months ago
Event Exposure for Web Services: A Grey-Box Approach to Compose and Evolve Web Services
Abstract. The service-oriented architecture (SOA) is an emerging software engineering paradigm for developing distributed enterprise applications. In this paradigm, Web services ar...
Chunyang Ye, Hans-Arno Jacobsen
FSTTCS
2007
Springer
15 years 4 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...
ISORC
2006
IEEE
15 years 4 months ago
Complexity Management for Composable Real-Time Systems
Embedded real-time systems are becoming increasingly complex due to ever increasing size and functionality so that complexity management is of growing importance, especially in de...
Bernhard Rumpler
JLP
2010
73views more  JLP 2010»
14 years 4 months ago
Composing model programs for analysis
Model programs are high-level behavioral specifications used for software testing and design analysis. Composition of model programs is a versatile technique that, at one end of t...
Margus Veanes, Jonathan Jacky