Sciweavers

624 search results - page 65 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
APSEC
2005
IEEE
15 years 5 months ago
A Tools Environment for Developing and Reasoning about Ontologies
Started in the beginning of 2001, the Semantic Web is regarded by many as the next generation of the Web. Ontology languages are the building blocks of Semantic Web as they provid...
Jin Song Dong, Yuzhang Feng, Yuan-Fang Li, Jun Sun...
INFOCOM
2010
IEEE
14 years 10 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
ICHIT
2009
Springer
15 years 6 months ago
Middleware-based distributed systems software process
Middleware facilitates the development of distributed systems by accommodating heterogeneity, hiding distribution details and providing a set of common and domain specific service...
Liu Jingyong, Zhong Yong, Chen Yong, Zhang Lichen
MAGS
2008
169views more  MAGS 2008»
14 years 11 months ago
ACVisualizer: A visualization tool for APi-calculus
Process calculi are mathematical tools used for modeling and analyzing the structure and behavior of reactive systems. One such calculus, called APi-calculus (an extension to Pi-ca...
Raheel Ahmad, Shahram Rahimi
ISICT
2004
15 years 1 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang