Sciweavers

7918 search results - page 181 / 1584
» Model Composition Directives
Sort
View
FOSSACS
2009
Springer
15 years 10 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
ICSE
2009
IEEE-ACM
15 years 10 months ago
ITACA: An integrated toolbox for the automatic composition and adaptation of Web services
Adaptation is of utmost importance in systems developed by assembling reusable software services accessed through their public interfaces. This process aims at solving, as automat...
Javier Cámara, José Antonio Mart&iac...
APSEC
2002
IEEE
15 years 8 months ago
Quality Driven Transformation Compositions for Object Oriented Migration
Reengineering legacy software systems to object oriented platforms has received significant attention over the past few years. In this paper, we propose a goal driven software mig...
Ying Zou, Kostas Kontogiannis
PODC
1995
ACM
15 years 6 months ago
A Framework for Protocol Composition in Horus
The Horus system supports a communication architecture ats protocols as instances of an abstract data type. This approach encourages developers to partition complex protocols into...
Robbert van Renesse, Kenneth P. Birman, Roy Friedm...
CBSE
2007
Springer
15 years 9 months ago
Towards Composing Software Components in Both Design and Deployment Phases
In component-based software development, the design of components should be carried out separately from the deployment of components, in order to enable composition by independent ...
Kung-Kiu Lau, Ling Ling, Perla Velasco Elizondo