Sciweavers

447 search results - page 17 / 90
» Rule Languages for Security and Privacy in Cooperative Syste...
Sort
View
85
Voted
IEEEARES
2008
IEEE
15 years 4 months ago
A Security Model and its Application to a Distributed Decision Support System for Healthcare
A distributed decision support system involving multiple clinical centres is crucial to the diagnosis of rare diseases. Although sharing of valid diagnosed cases can facilitate la...
Liang Xiao 0002, Javier Vicente, Carlos Sáe...
CCS
2003
ACM
15 years 3 months ago
Secure protocol composition
This paper continues the program initiated in [5], towards a derivation system for security protocols. The general idea is that complex protocols can be formally derived, starting...
Anupam Datta, Ante Derek, John C. Mitchell, Dusko ...
OOPSLA
1993
Springer
15 years 2 months ago
Object Fault Handling for Persistent Programming Languages: A Performance Evaluation
A key mechanism of a persistent programming language is its ability to detect and handle references to non-resident objects. Ideally, this mechanism should be hidden from the prog...
Antony L. Hosking, J. Eliot B. Moss
MOC
2010
14 years 4 months ago
Dynamical systems method for solving nonlinear equations with monotone operators
A version of the Dynamical Systems Method (DSM) for solving ill-posed nonlinear equations with monotone operators in a Hilbert space is studied in this paper. An a posteriori stopp...
N. S. Hoang, Alexander G. Ramm
CCS
2007
ACM
15 years 4 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...