Sciweavers

3504 search results - page 43 / 701
» Secure protocol composition
Sort
View
INFSOF
2010
68views more  INFSOF 2010»
14 years 8 months ago
A pattern-based approach to protocol mediation for web services composition
Xitong Li, Yushun Fan, Stuart E. Madnick, Quan Z. ...
DOCENG
2009
ACM
14 years 7 months ago
A REST protocol and composite format for interactive web documents
John M. Boyer, Charles Wiecha, Rahul P. Akolkar
CORR
2011
Springer
216views Education» more  CORR 2011»
14 years 4 months ago
Approaches to Formal Verification of Security Protocols
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional cor...
Suvansh Lal, Mohit Jain, Vikrant Chaplot
SPW
1997
Springer
15 years 1 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions betw...
John Kelsey, Bruce Schneier, David Wagner
CSFW
1999
IEEE
15 years 2 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek