Sciweavers

637 search results - page 76 / 128
» Inconsistency-Tolerant Integrity Checking
Sort
View
AMAST
2000
Springer
15 years 6 months ago
A New Logic for Electronic Commerce Protocols
The primary objective of this paper is to present the deÿnition of a new dynamic, linear and modal logic for security protocols. The logic is compact, expressive and formal. It a...
Kamel Adi, Mourad Debbabi, Mohamed Mejri
ECOOP
1999
Springer
15 years 6 months ago
Providing Fine-grained Access Control for Java Programs
There is considerable interest in programs that can migrate from one host to another and execute. Mobile programs are appealing because they support efficient utilization of networ...
Raju Pandey, Brant Hashii
WETICE
1998
IEEE
15 years 6 months ago
WebGroup: A Secure Group Access Control Tool for the World-Wide Web
We present an integrated secure group access control tool to support workgroups on the World-Wide Web. The system enables user authentication, encrypted communication and fine-gra...
Fabien A. P. Petitcolas, Kan Zhang
DBPL
1997
Springer
133views Database» more  DBPL 1997»
15 years 6 months ago
Automatic Verification of Transactions on an Object-Oriented Database
Abstract. In the context of the object-oriented data model, a compiletime approach is given that provides for a significant reduction of the amount of run-time transaction overhead...
David Spelt, Herman Balsters
CCS
1993
ACM
15 years 6 months ago
NetCash: A Design for Practical Electronic Currency on the Internet
NetCash is a framework that supports realtime electronic payments with provision of anonymity over an unsecure network. It is designed to enable new types of services on the Inter...
Gennady Medvinsky, B. Clifford Neuman