Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
Stream ciphers are a promising technique for encryption in trusted hardware. ISO/IEC standardization is currently under way and SNOW 2.0 is one of the remaining candidates. Its sof...
Wenhai Fang, Thomas Johansson, Lambert Spaanenburg
Abstract. UML 2.0, which is the standard modeling language for objectoriented systems, has only an informally given semantics. This is in particular the case for UML 2.0 state mach...
The diffusion of service-oriented computing is today heavily influencing many software development and research activities. Despite this, service-oriented computing is a relative...
Massimiliano Colombo, Elisabetta Di Nitto, Massimi...
Current Web generation techniques are mainly hard-coded for predefined architectures of Web applications. Consequently, there is a gap between Web design models and the final imple...