Compliance in behavioural contracts: a brief survey

M Bartoletti, T Cimoli, R Zunino - … with Applications to Biology and Security …, 2015 - Springer
Behavioural contracts are formal specifications of interaction protocols between two or more
distributed services. Despite the heterogeneous nature of the formalisms for behavioural …

Bring your own device, securely

A Armando, G Costa, A Merlo - Proceedings of the 28th Annual ACM …, 2013 - dl.acm.org
Modern mobile devices offer users powerful computational capabilities and complete
customization. As a matter of fact, today smartphones and tablets have remarkable hardware …

Semantics-based design for secure web services

M Bartoletti, P Degano, GL Ferrari… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
We outline a methodology for designing and composing services in a secure manner. In
particular, we are concerned with safety properties of service behaviour. Services can …

[PDF][PDF] Automata for specifying and orchestrating service contracts

D Basile, P Degano, GL Ferrari - Logical Methods in Computer …, 2017 - lmcs.episciences.org
An approach to the formal description of service contracts is presented in terms of automata.
We focus on the basic property of guaranteeing that in the multi-party composition of …

Formal modeling and reasoning about the android security framework

A Armando, G Costa, A Merlo - International Symposium on Trustworthy …, 2012 - Springer
Android OS is currently the most widespread mobile operating system and is very likely to
remain so in the near future. The number of available Android applications will soon reach …

CG-DIQA: No-reference document image quality assessment based on character gradient

H Li, F Zhu, J Qiu - 2018 24th International Conference on …, 2018 - ieeexplore.ieee.org
Document image quality assessment (DIQA) is an important and challenging problem in real
applications. In order to predict the quality scores of document images, this paper proposes …

Service net algebra based on logic Petri nets

Q Hu, Y Du, SX Yu - Information Sciences, 2014 - Elsevier
Web service process reuse can help us efficiently to construct a new service or service
process by using the existing service processes generated by service composition. Since …

Security Protocols: Principles and Calculi: Tutorial Notes

M Abadi - International School on Foundations of Security …, 2006 - Springer
This paper is a basic introduction to some of the main themes in the design and analysis of
security protocols. It includes a brief explanation of the principles of protocol design and of a …

Professional engineering pathways study: A longitudinal study of early career preparedness and decision-making

S Brunhaver, R Streveler, C Carrico… - 2015 IEEE Frontiers …, 2015 - ieeexplore.ieee.org
This paper introduces the Professional Engineering Pathways Study (PEPS), a three-year
study aimed at developing new understandings of early career engineering career …

Model checking usage policies

M Bartoletti, P Degano, GL Ferrari, R Zunino - … Global Computing: 4th …, 2009 - Springer
We propose a model for specifying, analysing and enforcing safe usage of resources. Our
usage policies allow for parametricity over resources, and they can be enforced through …