Sciweavers

1210 search results - page 181 / 242
» Secure Logic Synthesis
Sort
View
130
Voted
MA
1997
Springer
127views Communications» more  MA 1997»
15 years 8 months ago
The Architecture of the Ara Platform for Mobile Agents
: We describe a platform for the portable and secure execution of mobile agents written in various interpreted languages on top of a common run-time core. Agents may migrate at any...
Holger Peine, Torsten Stolpmann
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 5 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
PTS
2008
123views Hardware» more  PTS 2008»
15 years 5 months ago
Model-Based Firewall Conformance Testing
Firewalls are a cornerstone of todays security infrastructure for networks. Their configuration, implementing a firewall policy, is inherently complex, hard to understand, and diff...
Achim D. Brucker, Lukas Brügger, Burkhart Wol...
CCS
2008
ACM
15 years 5 months ago
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
Alessandro Armando, Roberto Carbone, Luca Compagna...
LOPSTR
1997
Springer
15 years 8 months ago
Development of Correct Transformation Schemata for Prolog Programs
Schema-based program transformation [8] has been proposed as an effective technique for the optimisation of logic programs. Schemata are applied to a logic program, mapping ineffi...
Julian Richardson, Norbert E. Fuchs