Sciweavers

229 search results - page 10 / 23
» Formal Modeling of RESTful Systems Using Finite-State Machin...
Sort
View
148 views 94 votes 15 years 7 months ago  ICCS 2007»
A model of computation (MoC) is a formal abstraction of execution in a computer. There is a need for composing MoCs in e-science. Kepler, which is based on Ptolemy II, is a scienti...
220 views 157 votes 14 years 11 months ago  RV 2010»
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
166 views 119 votes 15 years 5 months ago  EMSOFT 2006»
We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has...
132 views 90 votes 15 years 7 months ago  HASE 2008»
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
81 views 104 votes 15 years 2 months ago  PTS 2007»
Extended Finite State Machine (EFSM)-based passive fault detection involves modeling the system under test (SUT) as an EFSM M, monitoring the input/output behaviors of the SUT, and...
125 views 115 votes 15 years 5 months ago  ETRICS 2006»
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
146 views 106 votes 15 years 7 months ago  IEEESCC 2005»
In this paper we discuss a case study for the UK Police IT Organisation (PITO) on using a model-based approach to verifying web service composition interactions for a coordinated ...
106 views 115 votes 15 years 1 months ago  SOCA 2008»
Specification, modeling and analysis of interactions among peers that communicate via messages are becoming increasingly important due to the emergence of service oriented computi...
168 views 107 votes 15 years 3 months ago  CCS 2008»
Attribute staleness arises due to the physical distribution of authorization information, decision and enforcement points. This is a fundamental problem in virtually any secure di...
197 views 134 votes 15 years 2 months ago  ICWS 2010»
This paper presents a methodology and a set of tools for the modelling, validation and testing of Web service composition, conceived and developed within the French national projec...