This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistingu...
Verification methods for memory-manipulating C programs need to address not only well-typed programs that respect invariants such as the split heap memory model, but also programs...
Abstract. This contribution gives an overview of various access control strategies in use in contemporary healthcare scenarios and shows how a broad variety of respective policies ...
: this document presents a generic model capturing the essential structural and behavioral characteristics of network components in the light of fault management. The generic model...
In this paper we present a general framework for document production that covers generic document model needs and adaptation needs. We define a multimedia document model called Mad...