Sciweavers

2043 search results - page 131 / 409
» Reasoning About Security Models
Sort
View
ECIS
2003
15 years 6 months ago
The method evaluation model: a theoretical model for validating information systems design methods
Information Systems (IS) design research tends to emphasise the development of new methods (normative research), while addressing the evaluation of methods in only a limited fashi...
Daniel L. Moody
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 11 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
CONCUR
2003
Springer
15 years 10 months ago
Multi-Valued Model Checking via Classical Model Checking
Multi-valued model-checking is an extension of classical model-checking to reasoning about systems with uncertain information, which are common during early design stages. The addi...
Arie Gurfinkel, Marsha Chechik
APCCM
2010
15 years 6 months ago
Business modeling for service descriptions: a meta model and a UML profile
The evolution of service-oriented architectures toward market places for business services in the Internet, raises the need for rich service descriptions with respect to service p...
Gregor Scheithauer, Guido Wirtz
138
Voted
JSW
2008
105views more  JSW 2008»
15 years 5 months ago
Formal Models for Architecture Aspects and Their Weaving
Aspect-oriented concepts are currently introduced in early stages of software development to achieve better separation of concerns. However, at the architecture level, there exists...
Chunhua Yang, Haiyang Wang