Sciweavers

22 search results - page 2 / 5
» cas 2010
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
13 years 6 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
PROCEDIA
2010
116views more  PROCEDIA 2010»
13 years 4 months ago
Towards fully autonomic peer-to-peer systems
Large-scale distributed applications are becoming more and more demanding in terms of efficiency and flexibility of the technological infrastructure, for which traditional soluti...
Michele Amoretti
ESORICS
2010
Springer
13 years 7 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
SPAA
2010
ACM
13 years 6 months ago
A universal construction for wait-free transaction friendly data structures
Given the sequential implementation of any data structure, we show how to obtain an efficient, wait-free implementation of that data structure shared by any fixed number of proces...
Phong Chuong, Faith Ellen, Vijaya Ramachandran
GIS
2010
ACM
13 years 4 months ago
Spatial data infrastructures as complex adaptive systems
Many researchers throughout the world have been struggling to better understand and describe Spatial Data Infrastructures (SDIs). Our knowledge of the real forces and mechanisms b...
L. Grus, Joep Crompvoets, A. K. Bregt