12,180 Hits in 7.1 sec

Security Analysis of a Biometric Authentication System Using UMLsec and JML [chapter]

John Lloyd, Jan Jürjens
2009 Lecture Notes in Computer Science  
A number of software engineering approaches have been developed over the last few years to address this challenge, both in the context of model-level and code-level security assurance.  ...  As a representative of model-based security analysis, we considered the UMLsec approach and we investigated the JML annotation language as a representative of a code-level assurance approach.  ...  This could be detected by coding a suitable JML contract on the Java code level.  ... 
doi:10.1007/978-3-642-04425-0_7 fatcat:aavqjqhoyvbunlxitxgqylwsr4

Model-driven development of reactive information systems: from graph transformation rules to JML contracts

Reiko Heckel, Marc Lohmann
2006 International Journal on Software Tools for Technology Transfer (STTT)  
The main technical tool for achieving this goal is a mapping of graph transformation rules to contracts expressed in the Java Modeling Language (JML).  ...  The Model-Driven Architecture focuses on the evolution and integration of applications across heterogeneous platforms by means of generating implementations from platform-independent models.  ...  contracts in JML, the Java Modeling Language [5, 26] .  ... 
doi:10.1007/s10009-006-0020-z fatcat:mwneszx6dre6vhvbzjx34pkaoi

A development toolkit to realize autonomous and interoperable agents

Federico Bergenti, Agostino Poggi
2001 Proceedings of the fifth international conference on Autonomous agents - AGENTS '01  
At this level, agents are seen as Java programs and the developer is provided with a development library to integrate her code within the generated skeletons.  ...  A code generator producing Java skeletons from UML diagrams supports this level.  ...  Nested performatives are not allowed because, normally, a Java method is associated with each performative or each step of a protocol.  ... 
doi:10.1145/375735.376474 dblp:conf/agents/BergentiP01 fatcat:jaur2php5zfvfmr72ja4cokbc4

J-Sim: An Integrated Environment for Simulation and Model Checking of Network Protocols

Ahmed Sobeih, Mahesh Viswanathan, Darko Marinov, Jennifer C. Hou
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
In this paper, we report our work [24, 26] on extending the J-Sim network simulator [13] to be an integrated environment for both simulation and model checking of network protocols.  ...  Second, using a model checker for C or Java (like [9, 18, 1, 3, 10, 7] ) to verify the protocol code along with the simulator code might likely be intractable due to the complexity of the general-purpose  ...  Specifically, we have implemented a model checker (written in Java so that it can be readily integrated with J-Sim), and incorporated this model checker into J-Sim.  ... 
doi:10.1109/ipdps.2007.370519 dblp:conf/ipps/SobeihVMH07 fatcat:l75zk2h6tffqlhhhcm5dzzwbji

Controlling Application Interactions on the Novel Smart Cards with Security-by-Contract [chapter]

Olga Gadyatskaya, Fabio Massacci
2013 Lecture Notes in Computer Science  
We overview the Security-by-Contract approach that validates at load time that the application code respects the interaction policies of other applications already on the card, and discuss how this approach  ...  We have integrated the PolicyChecker with the ClaimChecker, to ease the contract delivery.  ...  and provided services in the code and match them with the contract.  ... 
doi:10.1007/978-3-642-40615-7_7 fatcat:nhkvdeet7zgn5hw6tsz3lrhrve

SC 2: Secure Communication over Smart Cards [chapter]

Nicola Dragoni, Eduardo Lostal, Davide Papini, Javier Fabra
2012 Lecture Notes in Computer Science  
The key idea lies in the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of the card hosting the application.  ...  The Security-by-Contract (S×C) framework has recently been proposed to support software evolution in open multi-application smart cards.  ...  Java version 1.6 has been used to implement the TTP and the TR, while SC has been implemented with Java Card 2.2.2.  ... 
doi:10.1007/978-3-642-27901-0_4 fatcat:zhamzoa7qbhjjpc4f5kw4wmawu

Multi-level Virtual Machine Debugging Using the Java Platform Debugger Architecture [chapter]

Thomas Würthinger, Michael L. Van De Vanter, Doug Simon
2010 Lecture Notes in Computer Science  
For example, debugging a Java VM written in Java requires understanding execution state at the source code, bytecode and machine code levels.  ...  This architecture adopts unchanged a standard debugging interface, the Java Platform Debugger Architecture (JPDA), in combination with the highly extensible NetBeans Integrated Development Environment.  ...  Fig. 4 . 4 Code example for the Java dynamic proxy mechanism combined with JDWP. Fig. 5 . 5 Dynamic proxy objects for implementing a protocol within the protocol. Fig. Fig. 6.  ... 
doi:10.1007/978-3-642-11486-1_34 fatcat:kii5xr2io5hzxmghcya4aldpxy

The gateway security model in the Java Electronic Commerce Framework [chapter]

Theodore Goldstein
1997 Lecture Notes in Computer Science  
JavaSoft is using the Gateway to create a new integrated open platform for financial applications called Java Electronic Commerce Framework.  ...  This paper describes an extension to the current Java security model called the "Gateway" and why it was necessary to create it.  ...  In contract Java's design is much more compact. Java provides the appropriate technology for deploying tight integration between applications while maintaining application data integrity.  ... 
doi:10.1007/3-540-63594-7_90 fatcat:e24fubom25bgdfu5igva2v7wii

A Service-Oriented Perspective on Blockchain Smart Contracts

Florian Daniel, Luca Guida
2019 IEEE Internet Computing  
For example, Xu et al. [7] propose the use of smart contracts as software connectors for reliable, decentralized data sharing, while Weber et al. [8] propose the integration of multiple smart contracts  ...  Next to logging transactions, blockchain platforms support the execution of pieces of code, socalled smart contracts [4, 5] , able to perform computations inside the blockchain.  ...  Contract type Components encapsulate data to be fetched and visualized or integrated and/or application logic to be interacted with.  ... 
doi:10.1109/mic.2018.2890624 fatcat:lsebaq7wffetnkng2c4gcqgzne

Generating Verifiable Java Code from Verified PVS Specifications [chapter]

Leonard Lensink, Sjaak Smetsers, Marko van Eekelen
2012 Lecture Notes in Computer Science  
Java annotated with JML assertions.  ...  To illustrate the tool's functionality a verified communication protocol from the NASA AirStar project is taken and a reference implementation in Java is generated.  ...  The generated code can be verified, changed and verified again. -The generated code is readable and it allows for integration with existing code.  ... 
doi:10.1007/978-3-642-28891-3_30 fatcat:zkuk7epqvvbztprjjwms5oboum

An Integrated Secure Web Architecture For Protected Mobile Code Distribution [chapter]

Mehrdad Jalali-Sohi, Rigobert Foka, Gaël Hachez, Alexander Beitlich
2001 IFIP Advances in Information and Communication Technology  
IPR (Intellectual Property Rights) protection is one of the key elements to be considered in the development of mobile code technologies (applets, agents, etc.) due to the mobile nature of this kind of  ...  Object Labeling Two ways for doing so are envisaged: one consists of packaging the Java component (generated bytecode) with a label certifying the code origin and its integrity.  ...  The code envelope will provide an integrated package where the mobile code and all protection mechanisms associated with this mobile code are stored.  ... 
doi:10.1007/978-0-387-35413-2_3 fatcat:hiuea2tx2jepvk5eorlgpksrzq

Typestate protocol specification in JML

Taekgoo Kim, Kevin Bierhoff, Jonathan Aldrich, Sungwon Kang
2009 Proceedings of the 8th international workshop on Specification and verification of component-based systems - SAVCBS '09  
It shows how typestate protocol specifications can be mixed with pre/post-condition specifications and how violations of code contracts in inheritance can be handled.  ...  The Java Modeling Language (JML) is a language for specifying the behavior of Java source code. However, it can describe the protocols of Java classes and interfaces only implicitly.  ...  However, the use of ghost field for handling violation of code contracts brings obvious disadvantages. First, the violation of code contract is handled in very ad-hoc fashion.  ... 
doi:10.1145/1596486.1596490 dblp:conf/sigsoft/KimBAK09 fatcat:hwyexutnsjh5xg2s4szbv2u3ma

Aspects of Exceptions at the Meta-level [chapter]

Ian Welch, Robert J. Stroud, Alexander Romanovsky
2001 Lecture Notes in Computer Science  
This makes it useful for dealing with mobile or third-party code where the API may be understood but the source code might not be available.  ...  paid to them by the Java reflection community with the exception of Garcia et. al  ... 
doi:10.1007/3-540-45429-2_25 fatcat:ppmj4wsuf5efngvi3g7gf6fbry

Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

Omar Jehovani López Orozco, Jose Luís Martínez Lastra, José A. Pérez García, María de los Ángeles Cavia Soto
2008 EURASIP Journal on Embedded Systems  
Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols.  ...  Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems.  ...  Messaging performance of contract-net interaction protocol The first test scenario with contract-net protocol was performed with one agent initiator and three agent participants; all were running on the  ... 
doi:10.1155/2008/470856 fatcat:6zb3tzkuabdondoe7qwzfnirae

Integrating jason in a multi-agent platform with support for interaction protocols

Bexy Alfonso, Emilio Vivancos, Vicent Botti, Ana García-Fornes
2011 Proceedings of the compilation of the co-located workshops on DSM'11, TMC'11, AGERE!'11, AOOPES'11, NEAT'11, & VMIL'11 - SPLASH '11 Workshops  
The agent communication follows the FIPA interaction protocols.  ...  We can count on communication standards, as the FIPA Interaction Protocols.  ...  They allow to perform some processing that the agent needs to do withing it's code by accessing to legacy code (Java in this case).  ... 
doi:10.1145/2095050.2095084 dblp:conf/oopsla/AlfonsoVBG11 fatcat:gydr6jqz7zbk7nblc23t4expfu
« Previous Showing results 1 — 15 out of 12,180 results