Sciweavers

7109 search results - page 287 / 1422
» Process Algebra with Combinators
Sort
View
SP
1996
IEEE
106views Security Privacy» more  SP 1996»
15 years 8 months ago
Security Properties and CSP
Security properties such as con dentiality and authenticity may be considered in terms of the ow of messages within a network. To the extent that this characterisation is justi ed...
Steve Schneider
ECTEL
2008
Springer
15 years 6 months ago
Issues in the Design of an Environment to Support the Learning of Mathematical Generalisation
Abstract. Expressing generality, recognising and analysing patterns and articulating structure is a complex task and one that is invariably problematic for students. Nonetheless, v...
Darren Pearce, Manolis Mavrikis, Eirini Geraniou, ...
ICWS
2008
IEEE
15 years 6 months ago
A Formal Model of Human Workflow
BPEL (Business Process Execution Language) has become the standard for specifying and executing workflow specifications for web service composition invocation. A major weakness of ...
Xiangpeng Zhao, Zongyan Qiu, Chao Cai, Hongli Yang
FAC
2002
66views more  FAC 2002»
15 years 4 months ago
Shallow Linear Action Graphs and their Embeddings
Action calculi, which generalise process calculi such as Petri nets, -calculus and ambient calculus, have been presented in terms of action graphs. We here offer linear action grap...
James J. Leifer, Robin Milner
ICUMT
2009
15 years 2 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio