Sciweavers

2043 search results - page 157 / 409
» Reasoning About Security Models
Sort
View
83
Voted
AIIA
2001
Springer
15 years 5 months ago
Characterising Concept's Properties in Ontologies
Abstract. This paper presents and motivates an extended ontology conceptual model which represents explicitly semantic information about concepts. This model results from explicitl...
Valentina A. M. Tamma, Trevor J. M. Bench-Capon
109
Voted
RTA
2005
Springer
15 years 6 months ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty
FUIN
2007
99views more  FUIN 2007»
15 years 23 days ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
105
Voted
EUROCRYPT
2007
Springer
15 years 7 months ago
Simulatable Adaptive Oblivious Transfer
We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that ...
Jan Camenisch, Gregory Neven, Abhi Shelat
102
Voted
JCP
2007
118views more  JCP 2007»
15 years 21 days ago
Tutoring an Entire Game with Dynamic Strategy Graphs: The Mixed-Initiative Sudoku Tutor
Abstract— In this paper, we develop a mixed-initiative intelligent tutor for the game of Sudoku called MITS. We begin by developing a characterization of the strategies used in S...
Allan Caine, Robin Cohen