EJB(Enterprise JavaBeans) is the server-side component model, and its purpose is to reduce the complexity of software development and to increase software reusability. Many concerns for development of EJB components h...
详细信息
ISBN:
(纸本)0769517870
EJB(Enterprise JavaBeans) is the server-side component model, and its purpose is to reduce the complexity of software development and to increase software reusability. Many concerns for development of EJB components have recently been raised. However, it is difficult to compose EJB components provided by third parties through the plug-and-play technique. Therefore, the composition method by Lego block styles is needed for EJB components. In this paper, the authors propose an approach to composition of EJB components using the C2 architectural style. In order to support EJB composition, our approach generates EJB wrappers that can be used in composing EJB components based on the C2 style. Also, our approach enables developers to create a new composite EJB for a C2 architecture, which is a large grained component and is composed of EJB components.
Experience using constraint programming to solve real-life problems has shown that finding an efficient solution to the problem often requires experimentation with different constraint solvers or even building a probl...
详细信息
GSAT has been proven highly effective for solving certain classes of large SAT problems. It starts from a randomly generated truth assignment and tries to reduce the number of violated clauses by iteratively flipping ...
详细信息
In this paper, we first define bisimulation-based non-deterministic admissible interference(BNAI), derive its process-theoretic characterization and present a compositional verification method with respect to the main...
详细信息
In industrial interdisciplinary projects where engineers of different sorts have to work together, a framework is necessary in order to support such an interdisciplinary development process. For example, the design in...
Efficient database design and construction is one of the most difficult and hard tasks for constructing information systems. During the database designing process, we have performed data modeling for understanding rea...
详细信息
In this paper, we first define bisimulation-based non-deterministic admissible interference (BNAI), derive its process-theoretic characterization and present a compositional verification method with respect to the mai...
In this paper, we first define bisimulation-based non-deterministic admissible interference (BNAI), derive its process-theoretic characterization and present a compositional verification method with respect to the main operators over communicating processes, generalizing in this way the similar trace-based results obtained in [19] into the finer notion of observation-based bisimulation [6]. Like its trace-based version, BNAI admits information flow between secrecy levels only through a downgrader (e.g. a cryptosystem), but is phrased into a generalization of observational equivalence [18]. We then describe an admissible interference-based method for the analysis of cryptographic protocols, extending, in a non-trivial way, the non interference-based approach presented in [11]. Confidentiality and authentication for cryptoprotocols are defined in terms of BNAI and their respective bisimulation-based proof methods are derived. Finally, as a significant illustration of the method, we consider simple case studies: the paradigmatic examples of the Wide Mouthed Frog protocol [1] and the Woo and Lam one-way authentication protocol [25]. The original idea of this methodology is to prove that the intruder may interfere with the protocol only through selected channels considered as admissible when leading to harmless interference.
This workshop was dedicated to research towards better support for unanticipated software evolution (USE) in development tools, programming languages, component models and related runtime *** report gives an overview ...
详细信息
暂无评论