Abstract Benny Pinkas HP Labs Abstract. We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any sub...
Abstract. Exceptions occur frequently in supply-chains. Consequently, detecting exceptions timely is of great practical value. To enable a timely detection of exceptions, this pape...
Composed Web service transactions executed in distributed networks often require an atomic execution. Guaranteeing atomicity in mobile networks involves a lot more challenges than ...
We aim at an adequate formal description of the dynamics of commitments and trust by transferring insights about actual human practices to a formal setting. Our framework is based ...
The specification and monitoring of conditional obligations and prohibitions with starting points and deadlines is a crucial aspect in the design of open interaction systems. In th...