Sciweavers

101 search results - page 16 / 21
» Formal approach to security metrics.: what does
Sort
View
IEEEARES
2007
IEEE
15 years 6 months ago
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems
Access control in decentralised collaborative systems present huge challenges especially where many autonomous entities including organisations, humans, software agents from diff...
Oluwafemi Ajayi, Richard O. Sinnott, Anthony Stell
ESORICS
2009
Springer
16 years 1 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
124
Voted
GEOS
2009
Springer
15 years 5 months ago
Towards Reasoning Pragmatics
Abstract. The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenge...
Pascal Hitzler
106
Voted
GI
2010
Springer
14 years 10 months ago
Finite System Composition and Interaction
: In this article, it is proven for finite systems that if by reciprocal interaction, one finite system determines the action of another finite system, then both systems become sub...
Johannes Reich
115
Voted
ICISC
2009
169views Cryptology» more  ICISC 2009»
14 years 10 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...