Author Manuscript, Published in "2nd International Workshop on Software Engineering for Resilient Systems (serene 2010) Dependability in Dynamic, Evolving and Heterogeneous Systems: the Connect Approach
暂无分享,去创建一个
Valérie Issarny | Antinisca Di Marco | Fabio Martinelli | Antonia Bertolino | Rachid Saadi | F. Martinelli | A. Bertolino | F. Giandomenico | I. Matteucci | V. Issarny | A. Sabetta | P. Masci | R. Saadi | Antinisca Di | Marco
[1] Paola Inverardi,et al. Capturing functional and non-functional connector , 2010 .
[2] Fabio Massacci,et al. Security-by-Contract (SxC) for Software and Services of Mobile Systems , 2009 .
[3] Sharon Paradesi,et al. Integrating Behavioral Trust in Web Service Compositions , 2009, 2009 IEEE International Conference on Web Services.
[4] Andrea Bondavalli,et al. Model-Based Evaluation as a Support to the Design of Dependable Systems , 2005 .
[5] Lionel Brunie,et al. T2D: a peer to peer trust management system based on disposition to trust , 2010, SAC '10.
[6] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[7] Fabio Martinelli,et al. A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application , 2008, ISoLA.
[8] Radu Grosu,et al. Software monitoring with bounded overhead , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[9] Antonia Bertolino,et al. Scaling up SLA monitoring in pervasive environments , 2007, ESSPE '07.
[10] Jean-Claude Laprie,et al. From Dependability to Resilience , 2008, DSN 2008.
[11] Fabio Massacci,et al. Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code , 2007, EuroPKI.
[12] Fabio Massacci,et al. Enhancing Java ME Security Support with Resource Usage Monitoring , 2008, ERCIM News.
[13] C. R. Ramakrishnan,et al. Model-Carrying Code (MCC): a new paradigm for mobile-code security , 2001, NSPW '01.
[14] Athman Bouguettaya,et al. Reputation Propagation in Composite Services , 2009, 2009 IEEE International Conference on Web Services.
[15] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[16] Valérie Issarny,et al. Conceptual Models for Assessment & Assurance of Dependability, Security and Privacy in the Eternal CONNECTed World , 2010 .
[17] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[18] Giovanna Di Marzo Serugendo,et al. Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective , 2009, SSS.
[19] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[20] Robert L. Wears,et al. Resilience Engineering: Concepts and Precepts , 2006, Quality and Safety in Health Care.
[21] Kyung-Goo Doh,et al. Trust Type Based Semantic Web Services Assessment and Selection , 2008, 2008 10th International Conference on Advanced Communication Technology.
[22] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.