Sciweavers

50 search results - page 6 / 10
» Secure Ownership and Ownership Transfer in RFID Systems
Sort
View
ICFP
2008
ACM
16 years 12 days ago
Functional translation of a calculus of capabilities
Reasoning about imperative programs requires the ability to track aliasing and ownership properties. We present a type system that provides this ability, by using regions, capabil...
Arthur Charguéraud, François Pottier
107
Voted
IJISEC
2006
88views more  IJISEC 2006»
15 years 13 days ago
Requirements engineering for trust management: model, methodology, and reasoning
Abstract A number of recent proposals aim to incorporate security engineering into mainstream software engineering. Yet, capturing trust and security requirements at an organizatio...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
MOBISYS
2008
ACM
16 years 1 days ago
Sixthsense: rfid-based enterprise intelligence
RFID is widely used to track the movement of goods through a supply chain. In this paper, we extend the domain of RFID by presenting SixthSense, a platform for RFID-based enterpri...
Lenin Ravindranath, Venkata N. Padmanabhan, Piyush...
88
Voted
HUMAN
2003
Springer
15 years 5 months ago
Peer-to-Peer Money: Free Currency over the Internet
This paper proposes a resilient, alternative monetary system on the Internet called i-WAT, based on WAT System[1] which uses a form of promissory note as the medium of exchanging g...
Kenji Saito
ANTSW
2004
Springer
15 years 5 months ago
Hypothesis Corroboration in Semantic Spaces with Swarming Agents
To anticipate and prevent acts of terrorism, Indications and Warnings analysts try to connect clues gleaned from massive quantities of complex data. Multi-agent approaches to suppo...
Peter Weinstein, H. Van Dyke Parunak, Paul Chiusan...