Sciweavers

3504 search results - page 56 / 701
» Secure protocol composition
Sort
View
IEEESCC
2006
IEEE
15 years 3 months ago
Business Process Adaptations via Protocols
Business process management in service-oriented computing (SOC) environments poses special challenges. In particular, SOC environments are dynamic, thereby requiring frequent chan...
Nirmit Desai, Amit K. Chopra, Munindar P. Singh
EEE
2005
IEEE
15 years 3 months ago
Service Composition in a Secure Agent-Based Architecture
We describe an agent-based situation-aware survivable architecture for the discovery and composition of web services. Our architecture provides for proofs that guaranteethe consis...
Ramesh Bharadwaj, Supratik Mukhopadhyay, Nilay Pad...
FMOODS
2006
14 years 11 months ago
Security Issues in Service Composition
Abstract. We use a distributed, enriched -calculus for describing networks of services. Both services and their clients can protect themselves, by imposing security constraints on ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
CSFW
2000
IEEE
15 years 2 months ago
Secure Composition of Untrusted Code: Wrappers and Causality Types
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
Peter Sewell, Jan Vitek
TES
2001
Springer
15 years 2 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...