Automated detection of critical code in composite web services
暂无分享,去创建一个
[1] Kevin W. Hamlen,et al. Computability classes for enforcement mechanisms , 2006, TOPL.
[2] Sebastián Uchitel,et al. Model-based verification of Web service compositions , 2003, 18th IEEE International Conference on Automated Software Engineering, 2003. Proceedings..
[3] Koushik Sen,et al. Generating Optimal Monitors for Extended Regular Expressions , 2003, RV@CAV.
[4] Lujo Bauer,et al. Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.
[5] Sebastián Uchitel,et al. LTSA-WS: a tool for model-based verification of web service compositions and choreography , 2006, ICSE.
[6] Kamel Adi,et al. Using Edit Automata for Rewriting-Based Security Enforcement , 2009, DBSec.
[7] Raman Kazhamiakin,et al. A Parametric Communication Model for the Verification of BPEL4WS Compositions , 2005, EPEW/WS-FM.
[8] Jocelyn Simmonds,et al. Monitoring and recovery for web service applications , 2012, Computing.
[9] Saeed Jalili,et al. WSCMon: runtime monitoring of web service orchestration based on refinement checking , 2012, Service Oriented Computing and Applications.
[10] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[11] Mahjoub Langar,et al. Formal enforcement of security policies on concurrent systems , 2011, J. Symb. Comput..
[12] Xiang Fu,et al. Analysis of interacting BPEL web services , 2004, WWW '04.