Zobrazeno 1 - 10
of 334
pro vyhledávání: '"Issarny, V"'
Autor:
Giorgini, P., Fabio Massacci, Mylopoulos, J., Siena, A., Zannone, N., Hermann, P., Issarny, V., Shiu, S.
Publikováno v:
Scopus-Elsevier
Trust Management (Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings), 415-419
STARTPAGE=415;ENDPAGE=419;TITLE=Trust Management (Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings)
Lecture Notes in Computer Science ISBN: 9783540260424
iTrust
ResearcherID
Trust Management (Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings), 415-419
STARTPAGE=415;ENDPAGE=419;TITLE=Trust Management (Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings)
Lecture Notes in Computer Science ISBN: 9783540260424
iTrust
ResearcherID
ST-Tool is a graphical tool integrating an agent-oriented requirements engineering methodology with tools for the formal analysis of models. Essentially, the tool allows designers to draw visual models representing functional, security and trust requ
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ERCIM News
ERCIM News, ERCIM, 2012, 2012 (88), pp.27-28
ERCIM News, 2012, 2012 (88), pp.27-28
Lancaster University-Pure
ERCIM News, ERCIM, 2012, 2012 (88), pp.27-28
ERCIM News, 2012, 2012 (88), pp.27-28
Lancaster University-Pure
International audience; We are moving towards a world in which everything is connected. Yet such a goal highlights the deficiencies of today's systems platforms in achieving a fundamental property of distributed systems, namely interoperability. Face
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::9dc4cd757f84e3c9b311287e0662406a
https://hal.inria.fr/hal-00659762/file/ercim.pdf
https://hal.inria.fr/hal-00659762/file/ercim.pdf
Publikováno v:
SFM. 6659
This tutorial provides an introduction to probabilistic model checking, a technique for automatically verifying quantitative properties of probabilistic systems. We focus on Markov decision processes (MDPs), which model both stochastic and nondetermi
Autor:
Lazouski A. [1], Martinelli F. [1], Matteucci I. [1], Dragoni, Nicola [2], Costa G. [2], Issarny V. [3], Saadi R. [3], Massacci F. [4]
Publikováno v:
Journal of wireless mobile networks, ubiquitous computing and dependable applications 1(4) (2011): 75–91.
info:cnr-pdr/source/autori:Lazouski A. [1], Martinelli F. [1], Matteucci I. [1], Dragoni, Nicola [2], Costa G. [2], Issarny V. [3], Saadi R. [3], Massacci F. [4]/titolo:Security-by-Contract-with-Trust for Mobile Devices/doi:/rivista:Journal of wireless mobile networks, ubiquitous computing and dependable applications/anno:2011/pagina_da:75/pagina_a:91/intervallo_pagine:75–91/volume:1(4)
info:cnr-pdr/source/autori:Lazouski A. [1], Martinelli F. [1], Matteucci I. [1], Dragoni, Nicola [2], Costa G. [2], Issarny V. [3], Saadi R. [3], Massacci F. [4]/titolo:Security-by-Contract-with-Trust for Mobile Devices/doi:/rivista:Journal of wireless mobile networks, ubiquitous computing and dependable applications/anno:2011/pagina_da:75/pagina_a:91/intervallo_pagine:75–91/volume:1(4)
Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications.In this work, we present the an extension of S×C, called Security-by-Contract-with-Trust (S×C×T). Indeed, we enrich the S×C architecture by integratin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=cnr_________::5517654bafc45c8c9ce8a02e7e6ecb87
http://www.cnr.it/prodotto/i/203308
http://www.cnr.it/prodotto/i/203308
Autor:
Bertolino A., Di Giandomenico F., Masci P., Sabetta A., Issarny V., Saadi R., Martinelli F., Matteucci I., Di Marco A.
Publikováno v:
SERENE
2nd International Workshop on Software Engineering for Resilient Systems, London, UK, 2010
info:cnr-pdr/source/autori:Martinelli F.; Matteucci I.; Di Marco A.; Issarny V.; Saadi R.; Bertolino A.; Di Giandomenico F.; Masci P. M.; Sabetta A./congresso_nome:2nd International Workshop on Software Engineering for Resilient Systems/congresso_luogo:London, UK/congresso_data:2010/anno:2010/pagina_da:/pagina_a:/intervallo_pagine
2nd International Workshop on Software Engineering for Resilient Systems, London-UK, 13-16 April 2010
info:cnr-pdr/source/autori:Bertolino A.; Di Giandomenico F.; Masci P.; Sabetta A.; Issarny V.; Saadi R.; Martinelli F.; Matteucci I.; Di Marco A./congresso_nome:2nd International Workshop on Software Engineering for Resilient Systems/congresso_luogo:London-UK/congresso_data:13-16 April 2010/anno:2010/pagina_da:/pagina_a:/intervallo_pagine
2nd International Workshop on Software Engineering for Resilient Systems, London, UK, 2010
info:cnr-pdr/source/autori:Martinelli F.; Matteucci I.; Di Marco A.; Issarny V.; Saadi R.; Bertolino A.; Di Giandomenico F.; Masci P. M.; Sabetta A./congresso_nome:2nd International Workshop on Software Engineering for Resilient Systems/congresso_luogo:London, UK/congresso_data:2010/anno:2010/pagina_da:/pagina_a:/intervallo_pagine
2nd International Workshop on Software Engineering for Resilient Systems, London-UK, 13-16 April 2010
info:cnr-pdr/source/autori:Bertolino A.; Di Giandomenico F.; Masci P.; Sabetta A.; Issarny V.; Saadi R.; Martinelli F.; Matteucci I.; Di Marco A./congresso_nome:2nd International Workshop on Software Engineering for Resilient Systems/congresso_luogo:London-UK/congresso_data:13-16 April 2010/anno:2010/pagina_da:/pagina_a:/intervallo_pagine
The EU Future and Emerging Technologies (FET) Project Connect aims at dropping the heterogeneity barriers that prevent the eternality of networking systems through a revo- lutionary approach: to synthesise on-the- y the Connectors via which networked
This paper introduces principled methods for the reliability analysis of business processes that rely on web services. The input to the problem is the BPEL specification of a business process and the output is the prediction of the process's reliabil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_____10561::362e7a11783b60012168ba32b5f4e3e4
http://olympias.lib.uoi.gr/jspui/handle/123456789/10997
http://olympias.lib.uoi.gr/jspui/handle/123456789/10997