-
1
-
-
35248850910
-
A path-history-sensitive access control model for mobile agent, environment
-
Washington, DC, USA, IEEE Computer Society
-
C. Cao and J. Lu. A path-history-sensitive access control model for mobile agent, environment. In ICDCSW '05: Proceedings of the Third International Workshop on Mobile Distributed Computing (MDC) (ICDCSW'05), pages 660-663, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ICDCSW '05: Proceedings of the Third International Workshop on Mobile Distributed Computing (MDC) (ICDCSW'05)
, pp. 660-663
-
-
Cao, C.1
Lu, J.2
-
2
-
-
84949751564
-
Security for mobile agents: Authentication and state appraisal
-
Rome, Italy
-
W. M. Farmer, J. D. Guttman, and V. Swarup. Security for mobile agents: Authentication and state appraisal. In Proceedings of the Fourth European Symposium on Research in Computer Security, pages 118-130, Rome, Italy, 1996.
-
(1996)
Proceedings of the Fourth European Symposium on Research in Computer Security
, pp. 118-130
-
-
Farmer, W.M.1
Guttman, J.D.2
Swarup, V.3
-
3
-
-
26444468031
-
F-SOFT: Software verification platform
-
Computer-Aided Verification, Springer-Verlag
-
F. Ivančić, Z. Yang, I. Shlyakhter, M. Ganai, A. Gupta, and P. Ashar. F-SOFT: Software verification platform. In Computer-Aided Verification, pages 301-306. Springer-Verlag, 2005. LNCS 3576.
-
(2005)
LNCS
, vol.3576
, pp. 301-306
-
-
Ivančić, F.1
Yang, Z.2
Shlyakhter, I.3
Ganai, M.4
Gupta, A.5
Ashar, P.6
-
4
-
-
2942535699
-
-
PhD thesis, State University of New York at Stony Brook, May, Advisor: Dr. Arthur Bernstein
-
S. Lu. Semantic Correctness of Transactions and Workflows. PhD thesis, State University of New York at Stony Brook, May 2002. Advisor: Dr. Arthur Bernstein.
-
(2002)
Semantic Correctness of Transactions and Workflows
-
-
Lu, S.1
-
5
-
-
35248820378
-
-
S. Lu. Itinerary safety reasoning and assurance. In C. zhong Xu, editor, Scalable and Secure Internet Services and Architecture, pages 247-262. Chapman & Hall/CRC, 2005.
-
S. Lu. Itinerary safety reasoning and assurance. In C. zhong Xu, editor, Scalable and Secure Internet Services and Architecture, pages 247-262. Chapman & Hall/CRC, 2005.
-
-
-
-
6
-
-
33746228635
-
Completeness and realizability: Conditions for automatic generation of workflows
-
S. Lu, A. Bernstein, and P. Lewis. Completeness and realizability: Conditions for automatic generation of workflows. International Journal of Foundations of Computer Science, 17(1):223-245, 2006.
-
(2006)
International Journal of Foundations of Computer Science
, vol.17
, Issue.1
, pp. 223-245
-
-
Lu, S.1
Bernstein, A.2
Lewis, P.3
-
7
-
-
35248834827
-
A formal framework for mobile agent itinerary specification, safety reasoning, and logic analysis
-
Columbus, OH, USA
-
S. Lu and C. zhong Xu. A formal framework for mobile agent itinerary specification, safety reasoning, and logic analysis. In Proc. of the 3rd IEEE International Workshop on Mobile Distributed Computing (MDC05), in conjunction with ICDCS2005, Columbus, OH, USA, 2005.
-
(2005)
Proc. of the 3rd IEEE International Workshop on Mobile Distributed Computing (MDC05), in conjunction with ICDCS2005
-
-
Lu, S.1
zhong Xu, C.2
-
8
-
-
31444433469
-
Guest editor's introduction to the special section on scientific workflows
-
Sept
-
B. Ludascher and C. Goble. Guest editor's introduction to the special section on scientific workflows. SIGMOD Record, 34(3):3-4, Sept. 2005.
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 3-4
-
-
Ludascher, B.1
Goble, C.2
-
9
-
-
31444445713
-
WOODSS and the web: Annotating and reusing scientific workflows
-
Sept
-
C. B. Medeiros, J. Perez-Alcazar, L. Digiampietri, G. Z. Pastorello, A. Santanche, R. S. Torres, E. Mladeira, and E. Bacarin. WOODSS and the web: Annotating and reusing scientific workflows. SIGMOD Record, 34(3):18-23, Sept. 2005.
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 18-23
-
-
Medeiros, C.B.1
Perez-Alcazar, J.2
Digiampietri, L.3
Pastorello, G.Z.4
Santanche, A.5
Torres, R.S.6
Mladeira, E.7
Bacarin, E.8
-
10
-
-
35248812250
-
Access control with safe role assignment for mobile agents
-
New York, NY, USA, ACM Press
-
G. Navarro, J. Borrell, J. A. Ortega-Ruiz, and S. Robles. Access control with safe role assignment for mobile agents. In AAMAS '05: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pages 1235-1236, New York, NY, USA, 2005. ACM Press.
-
(2005)
AAMAS '05: Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
, pp. 1235-1236
-
-
Navarro, G.1
Borrell, J.2
Ortega-Ruiz, J.A.3
Robles, S.4
-
11
-
-
31444456909
-
A survey of data provenance in e-science
-
Sept
-
Y Simmhan, B. Piale, and D. Gannon. A survey of data provenance in e-science. SIGMOD Record, 34(3):31-36, Sept. 2005.
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.1
Piale, B.2
Gannon, D.3
-
12
-
-
0029733838
-
Mobile agent security and Telescript
-
J. Tardo and L. Valente. Mobile agent security and Telescript. In IEEE CompCon '96, pages 58-63, 1996.
-
(1996)
IEEE CompCon '96
, pp. 58-63
-
-
Tardo, J.1
Valente, L.2
-
13
-
-
34047121643
-
Disjunctive image computation for emebedded software verification
-
Munich, Germany, Mar, to appear
-
C. Wang, Z. Yang, F. Ivancic, and A. Gupta. Disjunctive image computation for emebedded software verification. In Design, Automation and Test in Europe (DATE'06), Munich, Germany, Mar. 2006. to appear.
-
(2006)
Design, Automation and Test in Europe (DATE'06)
-
-
Wang, C.1
Yang, Z.2
Ivancic, F.3
Gupta, A.4
-
14
-
-
31444449557
-
Scheduling of scientific workflows in the ASKALON grid environment
-
Sept
-
M. Wieczorek, R. Prodan, and T. Fahringer. Scheduling of scientific workflows in the ASKALON grid environment. SIGMOD Record, 34(3):57-62, Sept. 2005.
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 57-62
-
-
Wieczorek, M.1
Prodan, R.2
Fahringer, T.3
-
15
-
-
35248845800
-
Runtime security verification for itinerary-driven mobile agents
-
Indianapolis, USA, September
-
Z. Yang, S. Lu, and P. Yang. Runtime security verification for itinerary-driven mobile agents. In Proc. of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pages 177-186, Indianapolis, USA, September 2006.
-
(2006)
Proc. of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
, pp. 177-186
-
-
Yang, Z.1
Lu, S.2
Yang, P.3
-
16
-
-
35248813604
-
Model checking approach to itinerary-based access control enforcement of mobile tasks in scientific workflows
-
To appear
-
Z. Yang, S. Lu, and P. Yang. Model checking approach to itinerary-based access control enforcement of mobile tasks in scientific workflows. Journal of Autonomic and Trusted Computing, 2007. To appear.
-
(2007)
Journal of Autonomic and Trusted Computing
-
-
Yang, Z.1
Lu, S.2
Yang, P.3
-
17
-
-
38149023941
-
Mixed symbolic, representations for model checking software programs
-
Z. Yang, C. Wang, F. Ivancic, and A. Gupta. Mixed symbolic, representations for model checking software programs. In A CM/IEEE International Conference on Formal Methods and Models for Codesign (Memocode'06), 2006.
-
(2006)
A CM/IEEE International Conference on Formal Methods and Models for Codesign (Memocode'06)
-
-
Yang, Z.1
Wang, C.2
Ivancic, F.3
Gupta, A.4
-
18
-
-
31444436554
-
A taxonomy of scientific workflow systems for grid computing
-
Sept
-
J. Yu and R. Buyya. A taxonomy of scientific workflow systems for grid computing. SIGMOD Record, 34(3):44-49, Sept. 2005.
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 44-49
-
-
Yu, J.1
Buyya, R.2
|