Sciweavers

963 search results - page 120 / 193
» Formal Analysis of BPMN Models Using Event-B
Sort
View
CCS
2009
ACM
16 years 2 months ago
Expressive policy analysis with enhanced system dynamicity
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...
FOCI
2007
IEEE
15 years 7 months ago
Waiting time analysis of foreign currency exchange rates: Beyond the renewal-reward theorem
— We evaluate the average waiting time between observing the price of financial markets and the next price change, especially in an on-line foreign exchange trading service for ...
Naoya Sazuka, Jun-ichi Inoue
ASIACRYPT
2008
Springer
15 years 3 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
ICDCSW
2005
IEEE
15 years 7 months ago
Analysis and Algorithms for Content-Based Event Matching
    Content-based  event  matching  is  an  important  problem  in  large-scale  event-based  publish/subscribe  systems.  However,  open  questions  remain  in ...
Satyen Kale, Elad Hazan, Fengyun Cao, Jaswinder Pa...
101
Voted
PODS
2005
ACM
119views Database» more  PODS 2005»
16 years 1 months ago
Security analysis of cryptographically controlled access to XML documents
Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one ...
Bogdan Warinschi, Martín Abadi