Sciweavers

143 search results - page 15 / 29
» A Formalization of Distributed Authorization with Delegation
Sort
View
COORDINATION
2006
Springer
15 years 2 months ago
Enabling Ubiquitous Coordination Using Application Sessions
Abstract. Enabling coordination among ubiquitous computing applicad resources requires programming abstractions and development tools tailored to this unique environment. This pape...
Christine Julien, Drew Stovall
79
Voted
ECOOPW
1997
Springer
15 years 4 months ago
Patterns of the Agenda
: Most of the study of patterns has been restricted to the composition of "new" patterns. These authors, however, believe that the investigation of design patterns is rip...
Amnon H. Eden, Amiram Yehudai
CADE
2011
Springer
14 years 10 days ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
CCS
2007
ACM
15 years 6 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
EJWCN
2010
122views more  EJWCN 2010»
14 years 7 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...