Sciweavers

523 search results - page 44 / 105
» A Formal Account of WS-BPEL
Sort
View
ESORICS
2005
Springer
15 years 3 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
GW
2005
Springer
119views Biometrics» more  GW 2005»
15 years 3 months ago
Dynamic Control of Captured Motions to Verify New Constraints
Simulating realistic human-like figures is still a challenging task when dynamics is involved. For example, making a virtual human jump to a given position requires to control the...
Carole Durocher, Franck Multon, Richard Kulpa
RE
2005
Springer
15 years 3 months ago
Modeling Security Requirements Through Ownership, Permission and Delegation
Security Requirements Engineering is emerging as a branch of Software Engineering, spurred by the realization that security must be dealt with early on during the requirements pha...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
FMCO
2004
Springer
15 years 3 months ago
Observability, Connectivity, and Replay in a Sequential Calculus of Classes
Abstract. Object calculi have been investigated as semantical foundation for object-oriented languages. Often, they are object-based, whereas the mainstream of object-oriented lang...
Erika Ábrahám, Marcello M. Bonsangue...
NMR
2004
Springer
15 years 3 months ago
Towards higher impact argumentation
There are a number of frameworks for modelling argumentation in logic. They incorporate a formal representation of individual arguments and techniques for comparing conflicting a...
Anthony Hunter