Analysis of distributed intrusion detection systems using Bayesian methods
DJ Burroughs, LF Wilson… - … Proceedings of the IEEE …, 2002 - ieeexplore.ieee.org
In computer and network security, standard approaches to intrusion detection and response
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …
attempt to detect and prevent individual attacks. However, it is not the attack but rather the …
On the verification of opacity in web services and their composition
Web service (WS) providers need to restrain access to private information when cooperating
with business partners. This need is translated in practice by an abstraction phase where …
with business partners. This need is translated in practice by an abstraction phase where …
Correctness checking for BPMN collaborations with sub-processes
BPMN collaboration models are commonly used to describe the behaviour and interactions
of processes in an inter-organisational context. An important role in this kind of models is …
of processes in an inter-organisational context. An important role in this kind of models is …
A simple layered RGB BRDF model
X Granier, W Heidrich - Graphical Models, 2003 - Elsevier
Many natural objects, and in particular layered materials, have non-linear reflection behavior
along the wavelengths. An accurate representation of phenomena such as interference and …
along the wavelengths. An accurate representation of phenomena such as interference and …
Trustworthy cross-organizational collaborations with hybrid on/off-chain declarative choreographies
Abstract Business Process Management communities increasingly adopt the blockchain
technology to support trustworthy decentralized execution of processes. In this context, the …
technology to support trustworthy decentralized execution of processes. In this context, the …
Model checking of composite cloud services
K Klai, H Ochi - 2016 IEEE International Conference on Web …, 2016 - ieeexplore.ieee.org
Composition of Cloud services is necessary when a single component is unable to satisfy all
the user's requirements. It is a complex task for Cloud managers which involves several …
the user's requirements. It is a complex task for Cloud managers which involves several …
Formal model and method to decompose process-aware IoT applications
Abstract The Internet of Things (IoT) integrates a large number of pervasive things that
continuously generate data about the physical world. While such generated data can be …
continuously generate data about the physical world. While such generated data can be …
Symbolic abstraction and deadlock-freeness verification of inter-enterprise processes
The design of complex inter-enterprise business processes (IEBP) is generally performed in
a modular way. Each process is designed separately and then the whole IEBP is obtained …
a modular way. Each process is designed separately and then the whole IEBP is obtained …
Formal abstraction and compatibility checking of web services
For automatically composing Web services in a correct manner, information about their
behaviors (an abstract model) has to be published in a repository. This abstract model must …
behaviors (an abstract model) has to be published in a repository. This abstract model must …
[PDF][PDF] A Parallel Construction of the Symbolic Observation Graph: the Basis for Efficient Model Checking of Concurrent Systems.
Abstract Model checking is a powerful and widespread technique for the verification of finite
distributed systems. It takes as input a formal model of a system and a formal specification …
distributed systems. It takes as input a formal model of a system and a formal specification …