Sciweavers

3504 search results - page 163 / 701
» Secure protocol composition
Sort
View
IEEEARES
2009
IEEE
15 years 12 months ago
Algebraic Properties in Alice and Bob Notation
—Alice and Bob notation is a popular way to describe security protocols: it is intuitive, succinct, and yet expressive. Several formal protocol specification languages are based...
Sebastian Mödersheim
GI
2004
Springer
15 years 10 months ago
Automating the Development of Web Service Compositions Using Templates
: The development of Web Service compositions has not yet been automated. Web Service-based process definitions can be created automatically using Web Service compositions template...
Dimka Karastoyanova, Alejandro P. Buchmann
COMPSAC
2005
IEEE
15 years 10 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
CCGRID
2002
IEEE
15 years 10 months ago
Symphony - A Java-Based Composition and Manipulation Framework for Computational Grids
We introduce the Symphony framework, a software ion layer that can sit on top of grid systems. Symphony provides a unified API for grid application developers and offers a graphic...
Markus Lorch, Dennis G. Kafura
ACSD
2009
IEEE
106views Hardware» more  ACSD 2009»
15 years 7 months ago
Specification Enforcing Refinement for Convertibility Verification
Protocol conversion deals with the automatic synthesis of an additional component, often referred to as an adaptor or a converter, to bridge mismatches between interacting compone...
Partha S. Roop, Alain Girault, Roopak Sinha, Grego...