Sciweavers

2043 search results - page 104 / 409
» Reasoning About Security Models
Sort
View
ENTCS
2006
112views more  ENTCS 2006»
15 years 20 days ago
Patterns for Timed Property Specifications
Patterns for property specification enable non-experts to write formal specifications that can be used for automatic model checking. The existing patterns identified in [6] allow ...
Volker Gruhn, Ralf Laue
93
Voted
ASIACRYPT
2005
Springer
15 years 6 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
79
Voted
IJCAI
2001
15 years 2 months ago
From Images to Bodies: Modelling and Exploiting Spatial Occlusion and Motion Parallax
This paper describes the Region Occlusion Calculus (ROC-20), that can be used to model spatial occlusion and the effects of motion parallax of arbitrary shaped objects. ROC-20 ass...
David A. Randell, Mark Witkowski, Murray Shanahan
ESORICS
2005
Springer
15 years 6 months ago
Quantifying Probabilistic Information Flow in Computational Reactive Systems
Information flow and non-interference are well-established techniques for expressing both integrity and privacy properties. Because of the enormous potential to transmit informati...
Michael Backes
AGENTS
2000
Springer
15 years 4 months ago
From one virtual actor to virtual crowds: requirements and constraints
A crowd is not only a group of many individuals. Crowd modelling involves problems that arise only when we focus on crowds. For instance, avoiding collision problems related to a ...
Soraia Raupp Musse, Daniel Thalmann