Sciweavers

144 search results - page 17 / 29
» Modeling conversation policies using permissions and obligat...
Sort
View
DAC
2003
ACM
15 years 10 months ago
Behavioral consistency of C and verilog programs using bounded model checking
We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the circuit and the program ...
Edmund M. Clarke, Daniel Kroening, Karen Yorav
SACMAT
2011
ACM
14 years 9 days ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
116
Voted
PODC
2012
ACM
12 years 12 months ago
Weak models of distributed computing, with connections to modal logic
This work presents a classification of weak models of distributed computing. We focus on deterministic distributed algorithms, and we study models of computing that are weaker ve...
Lauri Hella, Matti Järvisalo, Antti Kuusisto,...
WEBI
2009
Springer
15 years 4 months ago
CCR: A Model for Sharing Reputation Knowledge Across Virtual Communities
Information sharing is a key objective in the age of Internet and virtual communities. Reputation information is an important part of a user’s identity and is both a sensitive a...
Tal Grinshpoun, Nurit Gal-Oz, Amnon Meisels, Ehud ...
CCS
2005
ACM
15 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone