Sciweavers

1247 search results - page 139 / 250
» Reasoning about Function Objects
Sort
View
IEEESCC
2009
IEEE
15 years 4 months ago
Web Service Substitution Based on Preferences Over Non-functional Attributes
In many applications involving composite Web services, one or more component services may become unavailable. This presents us with the problem of identifying other components tha...
Ganesh Ram Santhanam, Samik Basu, Vasant Honavar
KBSE
2005
IEEE
15 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
CSFW
2010
IEEE
15 years 1 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
COMCOM
2000
130views more  COMCOM 2000»
14 years 9 months ago
Use Case Maps and LOTOS for the prototyping and validation of a mobile group call system
ABSTRACT -- SPEC-VALUE, a rigorous scenario-driven approach for the description and validation of complex system functionalities at the early stages of design, is presented. It is ...
Daniel Amyot, Luigi Logrippo
ICDCS
2003
IEEE
15 years 3 months ago
Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network
In a system proposed by Plaxton, Rajaraman and Richa (PRR), the expected cost of accessing a replicated object was proved to be asymptotically optimal for a static set of nodes an...
Huaiyu Liu, Simon S. Lam