-
1
-
-
0034509061
-
Security characterization of software components and their composition
-
(October 30 - November 04, 2000). TOOLS. IEEE Computer Society, Washington, DC
-
Khan, K. M., Han, J., and Zheng, Y. 2000. Security Characterization of Software Components and Their Composition, In Proceedings of the 36th international Conference on Technology of Object-Oriented Languages and Systems (Tools-Asia'OO) (October 30 - November 04, 2000). TOOLS. IEEE Computer Society, Washington, DC, 240.
-
(2000)
Proceedings of the 36th International Conference on Technology of Object-Oriented Languages and Systems (Tools-Asia'OO)
, pp. 240
-
-
Khan, K.M.1
Han, J.2
Zheng, Y.3
-
2
-
-
0032646571
-
Secure composition of insecure components
-
CSFW. IEEE Computer Society, Washington, DC
-
Sewell, P. and Vitek, J. 1999. Secure Composition of Insecure Components. In Proceedings of the 1999 IEEE Computer Security Foundations Workshop (June 28 - 30, 1999). CSFW. IEEE Computer Society, Washington, DC, 136.
-
(1999)
Proceedings of the 1999 IEEE Computer Security Foundations Workshop (June 28 - 30, 1999)
, pp. 136
-
-
Sewell, P.1
Vitek, J.2
-
3
-
-
84890284715
-
-
Kurt Bauknecht. 2002. LV-Nummer: 400376. Ambient Intelligence: The Vision of Information Society. BWZ der Universitat Wien
-
Kurt Bauknecht. 2002. LV-Nummer: 400376. Ambient Intelligence: The Vision of Information Society. BWZ der Universitat Wien.
-
-
-
-
4
-
-
84901351508
-
Software techniques appued to ami: Security patterns
-
(September, 2006). Developing Ambient InteUigence, Springer. . ISBN: 2-287- 47469-2
-
Francisco Sanchez-Cid, Antonio Muhoz, Daniel Serrano, M.C. Gago. Software Engineering Techniques AppUed to Ami: Security Patterns. In Proceedings of the First International Conference on Ambient Intelligence Developments (September, 2006). Developing Ambient InteUigence, Springer. Pages 108- 124. ISBN: 2-287- 47469-2
-
Proceedings of the First International Conference on Ambient Intelligence Developments
, pp. 108-124
-
-
Sanchez-Cid, F.1
Muhoz, A.2
Serrano, D.3
Gago, M.C.4
-
7
-
-
84890281753
-
Coordination and adaptation techniques: Bridging the gap between design and Implementation
-
Report on. ECOOP 2006 Workshop Reader, LNCS, Springer
-
Becker, S.; Canal, C; Diakov, N.; Murillo, J.M.; Poizat, P.; Tivoli, M. 2006. Coordination and Adaptation Techniques: Bridging the Gap between Design and Implementation. Report on the ECOOP'2006 Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT'06). ECOOP 2006 Workshop Reader, LNCS, Springer.
-
(2006)
The ECOOP'2006 Workshop on Coordination and Adaptation Techniques for Software Entities (WCAT'06)
-
-
Becker, S.1
Canal, C.2
Diakov, N.3
Murillo, J.M.4
Poizat, P.5
Tivoli, M.6
-
8
-
-
0036143326
-
Composing security-aware software
-
IEEE
-
Khan, K.; Han, J. Composing Security-aware Software. 2002. IEEE Software, Vol. 19, Issue 1, pp. 34-41. IEEE.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 34-41
-
-
Khan, K.1
Han, J.2
-
9
-
-
84890283156
-
Dynamic contextual adaptation CONCUR'2006 workshop on the foundations of coordination languages and software architectures (FOCLASA'06)
-
Elsevier, ISSN 1571-0661
-
Brogi, A.; Camara, J.; Canal, C; Cubo, J.; Pimentel E. 2006. Dynamic Contextual Adaptation CONCUR'2006 Workshop on the Foundations of Coordination Languages and Software Architectures (FOCLASA'06). Electronic Notes in Theoretical Computer Science, Elsevier, ISSN 1571-0661.
-
(2006)
Electronic Notes in Theoretical Computer Science
-
-
Brogi, A.1
Camara, J.2
Canal, C.3
Cubo, J.4
Pimentel, E.5
-
10
-
-
84890281751
-
Security properties of software components
-
Khan, K.; Han, J.; Zheng, Z.; Security properties of software Components. 1999. Proceedings of Information Security: Second International Workshop, ISW'99, Lecture Notes in Computer Science, Volume 1729.
-
(1999)
Proceedings Information Security: Second International Workshop, ISW'99, Lecture Notes in Computer Science
, vol.1729
-
-
Khan, K.1
Han, J.2
Zheng, Z.3
-
12
-
-
17744383167
-
Security patterns: A method for constructing secure and efficient inter-company coordination systems, enterprise distributed object computing conference, 2004
-
20-24 Sept
-
Nobukazu Y., Shinichi H., Anthony F. Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems, Enterprise Distributed Object Computing Conference, 2004. Eighth IEEE International Volume , Issue , 20-24 Sept. 2004 Page(s): 84-97.
-
(2004)
Eighth IEEE International
, pp. 84-97
-
-
Nobukazu, Y.1
Shinichi, H.2
Anthony, F.3
-
13
-
-
0034422338
-
The gaia methodology for agentoriented analysis and design
-
M. Wooldridge, N. R. Jennings, and D. Kinny. The Gaia methodology for agentoriented analysis and design. Journal of Autonomous Agents and Multi-Agent Systems, 3(3),pp. 285-312, 2000.
-
(2000)
Journal of Autonomous Agents and Multi-Agent Systems
, vol.3
, Issue.3
, pp. 285-312
-
-
Wooldridge, M.1
Jennings, N.R.2
Kinny, D.3
-
14
-
-
84890791723
-
Security architecture for component-based operating system
-
European Workshop 1998
-
Jaeger, T; Liedtke, J; Pantellenko, V; Park, Y; Islam, N. 1998. Security Architecture for component-based Operating System . In ACM Special Interest Group in Operating Systems (SIGOPS) European Workshop, 1998. 118.
-
(1998)
ACM Special Interest Group in Operating Systems (SIGOPS)
, pp. 118
-
-
Jaeger, T.1
Liedtke, J.2
Pantellenko, V.3
Park, Y.4
Islam, N.5
-
15
-
-
17144455408
-
Integrating PMI services in CORBA applications
-
Elsevier
-
Lopez, J; Mafia, A; Ortega, J.J; Troya, J.; Yagiie, M.I. 2003. Integrating PMI Services in CORBA Applications. Computer Standards & Interfaces, 25, 4, pp. 391-409, Elsevier.
-
(2003)
Computer Standards & Interfaces
, vol.25
, Issue.4
, pp. 391-409
-
-
Lopez, J.1
Mafia, A.2
Ortega, J.J.3
Troya, J.4
Yagiie, M.I.5
-
16
-
-
0037343253
-
Adding roles to CORBA objects
-
Mar
-
C. Canal, L. Fuentes, E. Pimentel, J.M. Troya, A. Vallecillo. "Adding Roles to CORBA Objects". IEEE Transactions on Software Engineering 29(3):242-260, Mar. 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.3
, pp. 242-260
-
-
Canal, C.1
Fuentes, L.2
Pimentel, E.3
Troya, J.M.4
Vallecillo, A.5
-
17
-
-
84890283155
-
-
XAMCL and OASIS Security Services Technical Committee, "extendible Access Control Markup Language (xacml) committee specification 2.0," Feb 2005
-
XAMCL and OASIS Security Services Technical Committee, "extendible Access Control Markup Language (xacml) committee specification 2.0," Feb 2005.
-
-
-
|