-
1
-
-
4243075269
-
Contracts and types
-
G. Meredith and S. Bjorg, "Contracts and Types," Comm. ACM, vol.46, no.10, 2003, pp. 41-47.
-
(2003)
Comm. ACM
, vol.46
, Issue.10
, pp. 41-47
-
-
Meredith, G.1
Bjorg, S.2
-
3
-
-
75649134251
-
Generating interface grammars from WSDL for automated verification of web services
-
Proc. 2009 Int'l Conf. Service-Oriented Computing (ICSOC 09), Springer
-
S. Hallé, et al., "Generating Interface Grammars from WSDL for Automated Verification of Web Services," Proc. 2009 Int'l Conf. Service-Oriented Computing (ICSOC 09), LNCS 5900, Springer, pp. 516-530.
-
LNCS
, vol.5900
, pp. 516-530
-
-
Hallé, S.1
-
5
-
-
33747127813
-
Runtime monitoring of requirements for systems composed of web-services: Initial implementation and evaluation experience
-
IEEE CS Press
-
K. Mahbub and G. Spanoudakis, "Runtime Monitoring of Requirements for Systems Composed of Web-Services: Initial Implementation and Evaluation Experience," Proc. IEEE Int'l Conf. Web Services (ICWS 05), IEEE CS Press, 2005, pp. 257-265.
-
(2005)
Proc. IEEE Int'l Conf. Web Services (ICWS 05)
, pp. 257-265
-
-
Mahbub, K.1
Spanoudakis, G.2
-
6
-
-
38049187813
-
Runtime monitoring of instances and classes of web service compositions
-
IEEE CS Press
-
F. Barbon et al., "Runtime Monitoring of Instances and Classes of Web Service Compositions," Proc. IEEE Int'l Conf. Web Services (ICWS 06), IEEE CS Press, 2006, pp. 63-71.
-
(2006)
Proc. IEEE Int'l Conf. Web Services (ICWS 06)
, pp. 63-71
-
-
Barbon, F.1
-
7
-
-
35348860223
-
Defeating script injection attacks with browser-enforced embedded policies
-
ACM Press
-
J. Trevor, N. Swamy, and M. Hicks, "Defeating Script Injection Attacks with Browser-Enforced Embedded Policies," Proc. 16th Int'l World Wide Web Conf. (WWW 07), ACM Press, 2007, pp. 601-610.
-
(2007)
Proc. 16th Int'l World Wide Web Conf. (WWW 07)
, pp. 601-610
-
-
Trevor, J.1
Swamy, N.2
Hicks, M.3
-
8
-
-
56649120680
-
Runtime monitoring of message-based workflows with data
-
IEEE CS Press
-
S. Hallé and R. Villemaire, "Runtime Monitoring of Message-Based Workflows with Data," Proc. IEEE 12th Ann. EDOC Conf. (EDOC 08), IEEE CS Press, 2008, pp. 63-72.
-
(2008)
Proc. IEEE 12th Ann. EDOC Conf. (EDOC 08)
, pp. 63-72
-
-
Hallé, S.1
Villemaire, R.2
-
9
-
-
38549107486
-
Runtime verification of interactions: From MSCS to aspects
-
Proc. 7th Int'l Workshop Runtime Verification (RV 07), Springer
-
I.H. Krüger, M. Meisinger, and M. Menarini, "Runtime Verification of Interactions: From MSCS to Aspects," Proc. 7th Int'l Workshop Runtime Verification (RV 07), LNCS 4839, Springer, 2007, pp. 63-74.
-
(2007)
LNCS
, vol.4839
, pp. 63-74
-
-
Krüger, I.H.1
Meisinger, M.2
Menarini, M.3
-
10
-
-
57049173078
-
Synthesizing monitors for safety properties: This time with calls and returns
-
Proc. 8th Int'l Workshop Runtime Verification (RV 08), Springer
-
G. Rosu, F. Chen, and T. Ball, "Synthesizing Monitors for Safety Properties: This Time with Calls and Returns," Proc. 8th Int'l Workshop Runtime Verification (RV 08), LNCS 5289, Springer, 2008, pp. 51-68.
-
(2008)
LNCS
, vol.5289
, pp. 51-68
-
-
Rosu, G.1
Chen, F.2
Ball, T.3
-
11
-
-
33845201666
-
DecSerFlow: Towards a truly declarative service flow language
-
Proc. 3rd Int'l Workshop Web Services and Formal Methods (WS-FM 06), Springer
-
W.M.P. Van Der Aalst and M. Pesic, "DecSerFlow: Towards a Truly Declarative Service Flow Language," Proc. 3rd Int'l Workshop Web Services and Formal Methods (WS-FM 06), LNCS 4184, Springer, 2006, pp. 1-23.
-
(2006)
LNCS
, vol.4184
, pp. 1-23
-
-
Van Der Aalst, W.M.P.1
Pesic, M.2
-
13
-
-
77949770188
-
Let's look at the logs: Low-Impact runtime verification
-
to appear
-
A. Groce, et al., "Let's Look at the Logs: Low-Impact Runtime Verification," The Computer J., to appear.
-
The Computer J.
-
-
Groce, A.1
|