Sciweavers

852 search results - page 129 / 171
» entcs 2010
Sort
View
ENTCS
2006
140views more  ENTCS 2006»
15 years 13 days ago
A Web Service Architecture for Enforcing Access Control Policies
Web services represent a challenge and an opportunity for organizations wishing to expose product and services offerings through the Internet. The Web service technology provides ...
Claudio Agostino Ardagna, Ernesto Damiani, Sabrina...
122
Voted
ENTCS
2006
164views more  ENTCS 2006»
15 years 13 days ago
Adaptive Medical Workflow Management for a Context-Dependent Home Healthcare Assistance Service
The provision of health-care services and home assistance to the elderly and chronic patients is a challenging application scenario for Web Services composition, which support the...
Liliana Ardissono, Antonio Di Leva, Giovanna Petro...
ENTCS
2006
101views more  ENTCS 2006»
15 years 13 days ago
Mumbo: A Rule-Based Implementation of a Run-time Program Generation Language
We describe our efforts to use rule-based programming to produce a model of Jumbo, a run-time program generation (RTPG) system for Java. Jumbo incorporates RTPG following the simp...
Baris Aktemur, Samuel N. Kamin
ENTCS
2006
145views more  ENTCS 2006»
15 years 13 days ago
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
We present the first cryptographically sound security proof of the well-known Otway-Rees protocol. More precisely, we show that the protocol is secure against arbitrary active att...
Michael Backes
ENTCS
2006
122views more  ENTCS 2006»
15 years 13 days ago
Verification of Clock Synchronization Algorithms: Experiments on a Combination of Deductive Tools
We report on an experiment in combining Isabelle with automatic first-order arithmetic provers to increase automation on the verification of distributed protocols. As a case study...
Damián Barsotti, Leonor Prensa Nieto, Alwen...