Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Abstract. We present the first complete soundness proof of the antiframe rule, a recently proposed proof rule for capturing information hiding in the presence of higher-order stor...
Jan Schwinghammer, Hongseok Yang, Lars Birkedal, F...
The distinctive features of interactive sound installations in public space are considered, with special attention to the rich, if undoubtedly difficult, environments in which the...