期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Software Composition of Different Security Level Components 被引量:1
1
作者 Frank Tsui Edward Jung Sheryl Duggins 《Computer Technology and Application》 2011年第11期835-842,共8页
In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associat... In this paper the authors show how software component design can affect security properties through different composition operators. The authors define software composition as the result of aggregating and/or associating a component to a software system. The component itself may be informational or functional and carry a certain level of security attribute. The authors first show that the security attributes or properties form a lattice structure when combined with the appropriate least upper bound and greatest lower bound type of operators. Three composition operators, named C l, C2 and C3 are developed. The system's security properties resulting from these compositions are then studied. The authors discuss how different composition operators maintain, relax and restrict the security properties. Finally, the authors show that C1 and C2 composition operators are order-sensitive and that C3 is order-insensitive. 展开更多
关键词 software composition SECURITY component-design.
下载PDF
Support for Dynamic Service Composition with Role-Based Interaction Model
2
作者 贺小箭 尤晋元 +1 位作者 唐新怀 贾兆庆 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第1期56-59,共4页
This paper aims to present a role-based interaction model for dynamic service composition in Grid environments. Assigning roles to a service means to associate with it capabilities that describes all the operations th... This paper aims to present a role-based interaction model for dynamic service composition in Grid environments. Assigning roles to a service means to associate with it capabilities that describes all the operations the service intends to perform. When all of the services can be recognized by their roles, the appropriate services can be selected. Based on the interaction policy, a role-based interaction model not only facilitates access control, but also offers flexible interaction mechanism for adapting service-oriented applications. This interaction model adopts programmable reactive tuple space to facilitate context-dependent coordination. 展开更多
关键词 COORDINATION ROLE service oriented computing software composition
下载PDF
Intermediate Common Model—The Solution to Separate Concerns and Responsiveness in Dynamic Context-Aware System
3
作者 Gaetan Rey The Can Do +2 位作者 Jean-Yves Tigli Stéphane Lavirotte Nhan Le Thanh 《Journal of Computer and Communications》 2017年第4期44-59,共16页
Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper... Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper provides a new architecture for context management that tries to solve both problems. This approach is also based on the analysis and synthesis of context-aware frameworks proposed in literature. Our solution is focus on a separation of contextual concerns at the design phase and preserves it as much as possible at runtime. For this, we introduce the notion of independent views that allow designers to focus on their domain of expertise. At runtime, the architecture is splitted in 2 independent levels of adaptation. The highest is in charge of current context identification and manages each view independently. The lowest handles the adaptation of the application according to the rules granted by the previous level. 展开更多
关键词 MIDDLEWARE Ubiquitous Computing Context-Aware System software composition software Architecture
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部