메뉴 건너뛰기




Volumn 5502, Issue , 2009, Pages 333-347

Tisa: A language design and modular verification technique for temporal policies in web services

Author keywords

[No Author keywords available]

Indexed keywords

BEHAVIORAL SPECIFICATION; DISTRIBUTED SOFTWARE; FUNCTIONAL BEHAVIORS; GREY-BOX; HEALTHCARE SERVICES; LANGUAGE DESIGN; MODULAR VERIFICATION; NON-FUNCTIONAL; PRIVACY REGULATION; REFINEMENT TECHNIQUES; SERVICE PROVIDER; SOURCE CODES; SUB-PROBLEMS;

EID: 67650126184     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00590-9_24     Document Type: Conference Paper
Times cited : (5)

References (44)
  • 3
    • 35048898814 scopus 로고    scopus 로고
    • Privacy and utility in business processes
    • Barth, A., Mitchell, J., Datta, A., Sundaram, S.: Privacy and utility in business processes. In: CSF 2007, pp. 279-294 (2007)
    • (2007) CSF 2007 , pp. 279-294
    • Barth, A.1    Mitchell, J.2    Datta, A.3    Sundaram, S.4
  • 4
    • 33845245278 scopus 로고    scopus 로고
    • Preliminary design of JML: A behavioral interface specification language for java
    • Leavens, G.T., Baker, A.L., Ruby, C.: Preliminary design of JML: a behavioral interface specification language for Java. SIGSOFT Softw. Eng. Notes 31(3), 1-38 (2006)
    • (2006) SIGSOFT Softw. Eng. Notes , vol.31 , Issue.3 , pp. 1-38
    • Leavens, G.T.1    Baker, A.L.2    Ruby, C.3
  • 7
    • 67650136343 scopus 로고    scopus 로고
    • A theory of contracts for web services
    • Castagna, G., Gesbert, N., Padovani, L.: A theory of contracts for web services. In: POPL 2008, pp. 261-272 (2008)
    • (2008) POPL 2008 , pp. 261-272
    • Castagna, G.1    Gesbert, N.2    Padovani, L.3
  • 11
    • 0004109647 scopus 로고    scopus 로고
    • The greybox approach: When blackbox specifications hide too much
    • Turku Center for Computer Science, August
    • Büchi, M., Weck, W.: The greybox approach: When blackbox specifications hide too much. Technical Report 297, Turku Center for Computer Science (August 1999)
    • (1999) Technical Report 297
    • Büchi, M.1    Weck, W.2
  • 12
    • 85017204677 scopus 로고
    • Refinement calculus, part i: Sequential nondeterministic programs
    • Back, R.J.R., von Wright, J.: Refinement calculus, part i: sequential nondeterministic programs. In: REX workshop, pp. 42-66 (1990)
    • (1990) REX workshop , pp. 42-66
    • Back, R.J.R.1    Von Wright, J.2
  • 13
    • 0023558869 scopus 로고
    • A theoretical basis for stepwise refinement and the programming calculus
    • Morris, J.M.: A theoretical basis for stepwise refinement and the programming calculus. Sci. Comput. Program. 9(3), 287-306 (1987)
    • (1987) Sci. Comput. Program. , vol.9 , Issue.3 , pp. 287-306
    • Morris, J.M.1
  • 15
    • 42149195986 scopus 로고    scopus 로고
    • Modular verification of higher-order methods with mandatory calls specified by model programs
    • Shaner, S.M., Leavens, G.T., Naumann, D.A.: Modular verification of higher-order methods with mandatory calls specified by model programs. In: OOPSLA 2007, pp. 351-368 (2007)
    • (2007) OOPSLA 2007 , pp. 351-368
    • Shaner, S.M.1    Leavens, G.T.2    Naumann, D.A.3
  • 16
    • 0030685617 scopus 로고    scopus 로고
    • Proof-carrying code
    • Necula, G.C.: Proof-carrying code. In: POPL 1997, pp. 106-119 (1997)
    • (1997) POPL 1997 , pp. 106-119
    • Necula, G.C.1
  • 19
    • 84976650749 scopus 로고
    • Guardians and actions: Linguistic support for robust, distributed programs
    • Liskov, B., Scheifler, R.: Guardians and actions: Linguistic support for robust, distributed programs. TOPLAS 5(3), 381-404 (1983)
    • (1983) TOPLAS , vol.5 , Issue.3 , pp. 381-404
    • Liskov, B.1    Scheifler, R.2
  • 20
    • 26844492006 scopus 로고    scopus 로고
    • Validating a web service security abstraction by typing
    • DOI 10.1007/s00165-004-0058-1
    • Gordon, A.D., Pucella, R.: Validating a web service security abstraction by typing. Formal Aspects of Computing 17(3), 277-318 (2005) (Pubitemid 41456135)
    • (2005) Formal Aspects of Computing , vol.17 , Issue.3 , pp. 277-318
    • Gordon, A.D.1    Pucella, R.2
  • 21
    • 49049090590 scopus 로고    scopus 로고
    • Ptolemy: A language with quantified typed events
    • In: Vitek, J. (ed.), Springer, Heidelberg
    • Rajan, H., Leavens, G.T.: Ptolemy: A language with quantified typed events. In: Vitek, J. (ed.) ECOOP 2008. LNCS, vol. 5142, pp. 155-179. Springer, Heidelberg (2008)
    • (2008) ECOOP 2008. LNCS , vol.5142 , pp. 155-179
    • Rajan, H.1    Leavens, G.T.2
  • 25
    • 33749423185 scopus 로고    scopus 로고
    • A design discipline and language features for modular reasoning in aspectoriented programs
    • Iowa State University, Jul
    • Clifton, C.: A design discipline and language features for modular reasoning in aspectoriented programs. Technical Report 05-15, Iowa State University (Jul 2005)
    • (2005) Technical Report 05-15
    • Clifton, C.1
  • 32
    • 0035520516 scopus 로고    scopus 로고
    • The ABCs of specification: Asml, behavior, and components
    • Component Based Software Development
    • Barnett, M., Schulte, W.: The ABCs of specification: AsmL, Behavior, and Components. Informatica 25(4), 517-526 (2001) (Pubitemid 34124908)
    • (2001) Informatica (Ljubljana) , vol.25 , Issue.4 , pp. 517-526
    • Barnett, M.1    Schulte, W.2
  • 33
    • 0031274275 scopus 로고    scopus 로고
    • Software reliability via run-time result-checking
    • Wasserman, H., Blum, M.: Software reliability via run-time result-checking. J. ACM 44(6), 826-849 (1997) (Pubitemid 127628553)
    • (1997) Journal of the ACM , vol.44 , Issue.6 , pp. 826-849
    • Wasserman, H.1    Blum, M.2
  • 34
    • 33646520319 scopus 로고    scopus 로고
    • Black-box testing of grey-box behavior
    • In: Petrenko, A., Ulrich, A. (eds.), Springer, Heidelberg
    • Tyler, B., Soundarajan, N.: Black-box testing of grey-box behavior. In: Petrenko, A., Ulrich, A. (eds.) FATES 2003. LNCS, vol. 2931, pp. 1-14. Springer, Heidelberg (2004)
    • (2004) FATES 2003. LNCS , vol.2931 , pp. 1-14
    • Tyler, B.1    Soundarajan, N.2
  • 36
    • 42149175438 scopus 로고    scopus 로고
    • XPi: A typed process calculus for XML messaging
    • Acciai, L., Boreale, M.: XPi: A typed process calculus for XML messaging. Science of Computer Programming 71(2), 110-143 (2008)
    • (2008) Science of Computer Programming , vol.71 , Issue.2 , pp. 110-143
    • Acciai, L.1    Boreale, M.2
  • 39
    • 46849121607 scopus 로고    scopus 로고
    • Guarding sensitive information streams through the jungle of composite web services
    • Wei, J., Singaravelu, L., Pu, C.: Guarding sensitive information streams through the jungle of composite web services. In: ICWS 2007, pp. 455-462 (2007)
    • (2007) ICWS 2007 , pp. 455-462
    • Wei, J.1    Singaravelu, L.2    Pu, C.3
  • 41
    • 84954104016 scopus 로고    scopus 로고
    • Trust but verify: Authorization for web services
    • Skalka, C.,Wang, X.S.: Trust but verify: authorization for web services. In: SWS, pp. 47-55 (2004)
    • (2004) SWS , pp. 47-55
    • Skalka, C.1    Wang, X.S.2
  • 44
    • 44949110433 scopus 로고    scopus 로고
    • Specifying dynamic security properties of web service based systems
    • Vorobiev, A., Han, J.: Specifying dynamic security properties of web service based systems. In: SKG 2006, p. 34 (2006)
    • (2006) SKG 2006 , pp. 34
    • Vorobiev, A.1    Han, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.