Sciweavers

288 search results - page 7 / 58
» Formal Analysis of Workflow Systems with Security Considerat...
Sort
View
CSFW
1998
IEEE
15 years 1 months ago
Formal Analysis of a Non-Repudiation Protocol
This paper applies the theory of Communicating Sequential Processes (CSP) to the modelling and analysis of a non-repudiation protocol. Non-repudiation protocols di er from authent...
Steve Schneider
SACMAT
2009
ACM
15 years 4 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
JAR
2008
115views more  JAR 2008»
14 years 9 months ago
Formal Models and Analysis of Secure Multicast in Wired and Wireless Networks
The spreading of multicast technology enables the development of group communication and so dealing with digital streams becomes more and more common over the Internet. Given the f...
Roberto Gorrieri, Fabio Martinelli, Marinella Petr...
CSCW
1996
ACM
15 years 1 months ago
Freeflow: Mediating Between Representation and Action in Workflow Systems
In order to understand some problems associated with workflow, we set out an analysis of workflow systems, identifying a number of basic issues in the underlying technology. This ...
Paul Dourish, Jim Holmes, Allan MacLean, Pernille ...
CHI
2007
ACM
15 years 10 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...