Sciweavers

10585 search results - page 1779 / 2117
» The Orc Programming Language
Sort
View
ICMT
2009
Springer
15 years 11 months ago
Bidirectional Transformations: A Cross-Discipline Perspective
Abstract. The GRACE International Meeting on Bidirectional Transformations was held in December 2008 near Tokyo, Japan. The meeting brought together researchers and practitioners f...
Krzysztof Czarnecki, J. Nathan Foster, Zhenjiang H...
ICMT
2009
Springer
15 years 11 months ago
Model Superimposition in Software Product Lines
In software product line engineering, feature composition generates software tailored to specific requirements from a common set of artifacts. Superimposition is a technique to me...
Sven Apel, Florian Janda, Salvador Trujillo, Chris...
IFIP
2009
Springer
15 years 11 months ago
Transformations between Cryptographic Protocols
Abstract. A transformation F between protocols associates the messages sent and received by participants in a protocol Π1 with messages sent and received in some Π2. Transformati...
Joshua D. Guttman
IFIP
2009
Springer
15 years 11 months ago
Towards a Type System for Security APIs
Security API analysis typically only considers a subset of an API’s functions, with results bounded by the number of function calls. Furthermore, attacks involving partial leakag...
Gavin Keighren, David Aspinall, Graham Steel
IFIP
2009
Springer
15 years 11 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...
« Prev « First page 1779 / 2117 Last » Next »