Sciweavers

2043 search results - page 157 / 409
» Reasoning About Security Models
Sort
View
AIIA
2001
Springer
15 years 10 months ago
Characterising Concept's Properties in Ontologies
Abstract. This paper presents and motivates an extended ontology conceptual model which represents explicitly semantic information about concepts. This model results from explicitl...
Valentina A. M. Tamma, Trevor J. M. Bench-Capon
RTA
2005
Springer
15 years 10 months ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty
158
Voted
FUIN
2007
99views more  FUIN 2007»
15 years 5 months ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
EUROCRYPT
2007
Springer
15 years 11 months ago
Simulatable Adaptive Oblivious Transfer
We study an adaptive variant of oblivious transfer in which a sender has N messages, of which a receiver can adaptively choose to receive k one-after-the-other, in such a way that ...
Jan Camenisch, Gregory Neven, Abhi Shelat
JCP
2007
118views more  JCP 2007»
15 years 5 months ago
Tutoring an Entire Game with Dynamic Strategy Graphs: The Mixed-Initiative Sudoku Tutor
Abstract— In this paper, we develop a mixed-initiative intelligent tutor for the game of Sudoku called MITS. We begin by developing a characterization of the strategies used in S...
Allan Caine, Robin Cohen