-
1
-
-
80052232028
-
A framework for providing a secure system of systems composition
-
Liverpool, UK: (in press)
-
M. Kennedy, D. Llewellyn-Jones, Q. Shi, and M. Merabti, "A Framework for Providing a Secure System of Systems Composition," The 12th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2011), Liverpool, UK: (in press), 2011.
-
(2011)
The 12th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2011)
-
-
Kennedy, M.1
Llewellyn-Jones, D.2
Shi, Q.3
Merabti, M.4
-
2
-
-
34147146459
-
Model Driven Development of Security Aspects
-
DOI 10.1016/j.entcs.2006.10.016, PII S157106610700148X
-
T. Ritter, R. Schreiner, and U. Lang, with Julia Reznik, "Model Driven Development of Security Aspects," Electronic Notes in Theoretical Computer Science, vol. 163, Apr. 2007, pp. 65-79. (Pubitemid 46575391)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.163
, Issue.2 SPEC. ISS.
, pp. 65-79
-
-
Reznik, J.1
Ritter, T.2
Schreiner, R.3
Lang, U.4
-
3
-
-
28144460333
-
Enforcing secure service composition
-
Proceedings of the 18th IEEE Computer Security Foundations Workshop
-
M. Bartoletti, P. Degano, and G.L. Ferrari, "Enforcing Secure Service Composition," 18th IEEE Computer Security Foundations Workshop (CSFW'05), Jun. 2005, pp. 211-223. (Pubitemid 41696431)
-
(2005)
Proceedings of the Computer Security Foundations Workshop
, pp. 211-223
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
4
-
-
77953837414
-
Secure service composition with symbolic effects
-
IEEE
-
G. Costa, P. Degano, and F. Martinelli, "Secure Service Composition with Symbolic Effects," 2009 Fourth South-East European Workshop on Formal Methods, IEEE, 2009, pp. 3-9.
-
(2009)
2009 Fourth South-East European Workshop on Formal Methods
, pp. 3-9
-
-
Costa, G.1
Degano, P.2
Martinelli, F.3
-
5
-
-
79951750717
-
Aspect oriented approach to building secure service composition
-
IEEE
-
G. Fan, H. Yu, L. Chen, and D. Liu, "Aspect Oriented Approach to Building Secure Service Composition," 2010 Asia Pacific Software Engineering Conference, IEEE, 2010, pp. 176-185.
-
(2010)
2010 Asia Pacific Software Engineering Conference
, pp. 176-185
-
-
Fan, G.1
Yu, H.2
Chen, L.3
Liu, D.4
-
6
-
-
84856118858
-
Mixed initiative use cases for semi-automated service composition
-
New York, New York, USA: ACM Press
-
J. Schaffner and H. Meyer, "Mixed initiative use cases for semi-automated service composition," Proceedings of the 2006 international workshop on Service-oriented software engineering - SOSE '06, New York, New York, USA: ACM Press, 2006, p. 6.
-
(2006)
Proceedings of the 2006 International Workshop on Service-oriented Software Engineering - SOSE '06
, pp. 6
-
-
Schaffner, J.1
Meyer, H.2
-
7
-
-
33745186372
-
PASSAT: A user-centric planning framework
-
Houston, TX, USA:
-
K.L. Myers, W.M. Tyson, W. Mabry, P.A. Jarvis, T.J. Lee, M. DesJardins, T. Michael, and M.J. Wolverton, "PASSAT: A User-centric Planning Framework," 3rd International NASA Workshop on Planning and Scheduling for Space, Houston, TX, USA: 2002.
-
(2002)
3rd International NASA Workshop on Planning and Scheduling for Space
-
-
Myers, K.L.1
Tyson, W.M.2
Mabry, W.3
Jarvis, P.A.4
Lee, T.J.5
Desjardins, M.6
Michael, T.7
Wolverton, M.J.8
-
8
-
-
77953259279
-
Towards a decision model based on trust and security risk management
-
B. Alcalde, E. Dubois, S. Mauw, N. Mayer, and S. Radomirovic, "Towards a decision model based on trust and security risk management," Seventh Australasian Conference on Information Security (AISC '09), 2009, pp. 61-70.
-
(2009)
Seventh Australasian Conference on Information Security (AISC '09)
, pp. 61-70
-
-
Alcalde, B.1
Dubois, E.2
Mauw, S.3
Mayer, N.4
Radomirovic, S.5
-
9
-
-
33646848807
-
A routing protocol based on trust for MANETs
-
Beijing, China: Springer-Verlag
-
C. Wang, X. Yang, and Y. Gao, "A routing protocol based on trust for MANETs," 4th International Conference on Grid and Cooperative Computing (GCC 2005), Beijing, China: Springer-Verlag,.
-
4th International Conference on Grid and Cooperative Computing (GCC 2005)
-
-
Wang, C.1
Yang, X.2
Gao, Y.3
-
10
-
-
50949088090
-
Trust aware routing in mobile ad hoc networks
-
San Francisco, CA, United States: IEEE
-
L. Abusalah, A. Khokhar, and M. Guizani, "Trust aware routing in mobile ad hoc networks," Global Telecommunications Conference (IEEE GLOBECOM '06), San Francisco, CA, United States: IEEE, 2006, pp. 1-5.
-
(2006)
Global Telecommunications Conference (IEEE GLOBECOM '06)
, pp. 1-5
-
-
Abusalah, L.1
Khokhar, A.2
Guizani, M.3
-
11
-
-
77949589445
-
A reputation based scheme to deter identity based attacks for clustered MANETs
-
Liverpool, UK
-
S. Abbas, M. Merabti, and D. Llewellyn-Jones, "A Reputation Based Scheme to Deter Identity Based Attacks for Clustered MANETs," The 10th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2009), Liverpool, UK: 2009.
-
(2009)
The 10th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2009)
-
-
Abbas, S.1
Merabti, M.2
Llewellyn-Jones, D.3
-
12
-
-
0003780986
-
-
Stanford InfoLab
-
L. Page, S. Brin, R. Motwani, and T. Winograd, The PageRank Citation Ranking: Bringing Order to the Web, Stanford InfoLab, 1999.
-
(1999)
The PageRank Citation Ranking: Bringing Order to the Web
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
13
-
-
70349233792
-
Formal analysis of SAML 2.0 web browser single sign-on
-
New York, New York, USA: ACM Press
-
A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. Tobarra, "Formal analysis of SAML 2.0 web browser single sign-on," Proceedings of the 6th ACM workshop on Formal methods in security engineering (FMSE '08), New York, New York, USA: ACM Press, 2008, pp. 1-10.
-
(2008)
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE '08)
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Tobarra, L.5
-
15
-
-
70349706054
-
An architectural foundation for security model sharing and reuse
-
IEEE
-
P.H. Meland, S. Ardi, J. Jensen, E. Rios, T. Sanchez, N. Shahmehri, and I.A. Tøndel, "An Architectural Foundation for Security Model Sharing and Reuse," International Conference on Availability, Reliability and Security, IEEE, 2009, pp. 823-828.
-
(2009)
International Conference on Availability, Reliability and Security
, pp. 823-828
-
-
Meland, P.H.1
Ardi, S.2
Jensen, J.3
Rios, E.4
Sanchez, T.5
Shahmehri, N.6
Tøndel, I.A.7
-
16
-
-
77956596585
-
System-of-systems boundary check in a public event scenario
-
Loughborough, UK:
-
B. Zhou, O. Drew, A. Arabo, D. Llewellyn-Jones, K. Kifayat, M. Merabti, Q. Shi, R. Craddock, A. Waller, and G. Jones, "System-of-Systems Boundary Check in a Public Event Scenario," 5th International Conference on Systems of Systems Engineering (SoSE 2010), Loughborough, UK: 2010.
-
(2010)
5th International Conference on Systems of Systems Engineering (SoSE 2010)
-
-
Zhou, B.1
Drew, O.2
Arabo, A.3
Llewellyn-Jones, D.4
Kifayat, K.5
Merabti, M.6
Shi, Q.7
Craddock, R.8
Waller, A.9
Jones, G.10
-
17
-
-
77952682763
-
Extending security-by-contract with quantitative trust on mobile devices
-
IEEE
-
G. Costa, N. Dragoni, A. Lazouski, F. Martinelli, F. Massacci, and I. Matteucci, "Extending Security-by-Contract with Quantitative Trust on Mobile Devices," International Conference on Complex, Intelligent and Software Intensive Systems, IEEE, 2010, pp. 872-877.
-
(2010)
International Conference on Complex, Intelligent and Software Intensive Systems
, pp. 872-877
-
-
Costa, G.1
Dragoni, N.2
Lazouski, A.3
Martinelli, F.4
Massacci, F.5
Matteucci, I.6
|