Pub Date : 2015-04-13DOI: 10.1007/978-3-319-27152-1_9
Mohammed Shafiul Alam Khan, C. Mitchell
{"title":"Improving Air Interface User Privacy in Mobile Telephony","authors":"Mohammed Shafiul Alam Khan, C. Mitchell","doi":"10.1007/978-3-319-27152-1_9","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_9","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125721860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-16DOI: 10.1007/978-3-319-14054-4_12
Nils Fleischhacker, M. Manulis, Amir Azodi
{"title":"A Modular Framework for Multi-Factor Authentication and Key Exchange","authors":"Nils Fleischhacker, M. Manulis, Amir Azodi","doi":"10.1007/978-3-319-14054-4_12","DOIUrl":"https://doi.org/10.1007/978-3-319-14054-4_12","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129570296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-16DOI: 10.1007/978-3-319-14054-4_5
Jinwoo Lee, P. Lee
{"title":"Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode","authors":"Jinwoo Lee, P. Lee","doi":"10.1007/978-3-319-14054-4_5","DOIUrl":"https://doi.org/10.1007/978-3-319-14054-4_5","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-16DOI: 10.1007/978-3-319-14054-4_14
Britta Hale, C. Boyd
{"title":"Computationally Analyzing the ISO 9798-2.4 Authentication Protocol","authors":"Britta Hale, C. Boyd","doi":"10.1007/978-3-319-14054-4_14","DOIUrl":"https://doi.org/10.1007/978-3-319-14054-4_14","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126224460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-16DOI: 10.1007/978-3-319-14054-4_7
J. Guttman, Moses D. Liskov, Paul D. Rowe
{"title":"Security Goals and Evolving Standards","authors":"J. Guttman, Moses D. Liskov, Paul D. Rowe","doi":"10.1007/978-3-319-14054-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-14054-4_7","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127570035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-16DOI: 10.1007/978-3-319-14054-4_8
Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, C. Meadows, J. Meseguer
{"title":"Analysis of the IBM CCA Security API Protocols in Maude-NPA","authors":"Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, C. Meadows, J. Meseguer","doi":"10.1007/978-3-319-14054-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-14054-4_8","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115844657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-16DOI: 10.1007/978-3-319-14054-4_9
Efstathios Stathakidis, Steve A. Schneider, J. Heather
{"title":"Robustness Modelling and Verification of a Mix Net Protocol","authors":"Efstathios Stathakidis, Steve A. Schneider, J. Heather","doi":"10.1007/978-3-319-14054-4_9","DOIUrl":"https://doi.org/10.1007/978-3-319-14054-4_9","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates the design of reusable component interconnection in client/ server systems. In particular, the paper describes the design of component interconnection patterns, which define and encapsulate the way client and server components communicate with each other. This paper uses the Unified Modeling Language (UML) to describe the component interconnection patterns for synchronous, asynchronous, and brokered communication. When designing a new distributed application, the appropriate component interaction patterns may then be selected and reused.
{"title":"Reusable component interconnection patterns for distributed software architectures","authors":"H. Gomaa, D. Menascé, M. Shin","doi":"10.1145/375212.375252","DOIUrl":"https://doi.org/10.1145/375212.375252","url":null,"abstract":"This paper investigates the design of reusable component interconnection in client/ server systems. In particular, the paper describes the design of component interconnection patterns, which define and encapsulate the way client and server components communicate with each other. This paper uses the Unified Modeling Language (UML) to describe the component interconnection patterns for synchronous, asynchronous, and brokered communication. When designing a new distributed application, the appropriate component interaction patterns may then be selected and reused.","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Component-based software engineering is concerned with predictability in both functional and performance behavior, though most formal techniques have typically focused their attention on the former. Reasoning about the (functional or performance) behavior of a component-based system must be compositional in order to be scalable. Compositional performance reasoning demands that components include performance specifications, in addition to descriptions of functional behavior. Unfortunately, as explained in this paper, classical techniques and notations for performance analysis are either unsuitable or unnatural to capture performance behaviors of generic software components. They fail to work in the presence of parameterization and layering. The paper introduces elements of a compositional approach to performance analysis using a detailed example. It explains that performance specification problems are so basic that there are unresolved research issues to be tackled even for the simplest reusable components. These issues must be tackled by any practical proposal for sound performance reasoning. Only then will software developers be able to engineer new systems by choosing and assembling components that best fit their performance (time and space) requirements.
{"title":"Performance specification of software components","authors":"M. Sitaraman, J. Krone, W. Ogden","doi":"10.1145/375212.375223","DOIUrl":"https://doi.org/10.1145/375212.375223","url":null,"abstract":"Component-based software engineering is concerned with predictability in both functional and performance behavior, though most formal techniques have typically focused their attention on the former. Reasoning about the (functional or performance) behavior of a component-based system must be compositional in order to be scalable. Compositional performance reasoning demands that components include performance specifications, in addition to descriptions of functional behavior. Unfortunately, as explained in this paper, classical techniques and notations for performance analysis are either unsuitable or unnatural to capture performance behaviors of generic software components. They fail to work in the presence of parameterization and layering. The paper introduces elements of a compositional approach to performance analysis using a detailed example. It explains that performance specification problems are so basic that there are unresolved research issues to be tackled even for the simplest reusable components. These issues must be tackled by any practical proposal for sound performance reasoning. Only then will software developers be able to engineer new systems by choosing and assembling components that best fit their performance (time and space) requirements.","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133205138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}