Sciweavers

155 search results - page 3 / 31
» Vicinity Respecting Homomorphisms for Abstracting System Req...
Sort
View
TOPLAS
2002
98views more  TOPLAS 2002»
13 years 5 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
KIVS
2009
Springer
14 years 9 days ago
Abstract User Interfaces for Mobile Processes
User Interfaces for Mobile Processes Sonja Zaplata, Ante Vilenica, Dirk Bade, Christian P. Kunze Distributed Systems and Information Systems, Computer Science Department, Universit...
Sonja Zaplata, Ante Vilenica, Dirk Bade, Christian...
WSC
2000
13 years 7 months ago
Abstract modeling for engineering and engagement level simulations
MODELING FOR ENGINEERING AND ENGAGEMENT LEVEL SIMULATIONS Robert M. McGraw Richard A. MacDonald RAM Laboratories, Inc. 6540 Lusk Boulevard, Suite C200 San Diego, CA 92121, U.S.A. ...
Robert M. McGraw, Richard A. MacDonald
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky
MODELS
2007
Springer
13 years 12 months ago
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
Michael Hafner, Mukhtiar Memon, Muhammad Alam