Sciweavers

1078 search results - page 160 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
POPL
2008
ACM
16 years 4 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
SACMAT
2009
ACM
15 years 11 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
ICEIS
2007
IEEE
15 years 10 months ago
Challenges in Business Process Analysis
Business process analysis ranges from model verification at design-time to the monitoring of processes at run-time. Much progress has been achieved in process verification. Today...
Wil M. P. van der Aalst
AMAST
2008
Springer
15 years 6 months ago
Towards an Efficient Implementation of Tree Automata Completion
Term Rewriting Systems (TRSs) are now commonly used as a modeling language for applications. In those rewriting based models, reachability analysis, i.e. proving or disproving that...
Emilie Balland, Yohan Boichut, Thomas Genet, Pierr...
IQ
2007
15 years 5 months ago
When Interactive TV Meets Online Auction: A Study On Factors Affecting User Adoption
: This research has attempted to find the impact of information quality (IQ) and system quality (SQ) on users’ attitude to adopt the interactive TV based auction service. The pri...
Jaeheung Yoo, Imsook Ha, Junkyun Choi