Sciweavers

852 search results - page 88 / 171
» entcs 2010
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
14 years 11 months ago
Compositionality of Security Protocols: A Research Agenda
The application of formal methods to security protocol analysis has been extensively researched during the last 25 years. Several formalisms and (semi-)automatic tools for the ver...
Cas J. F. Cremers
ENTCS
2006
123views more  ENTCS 2006»
14 years 11 months ago
Nonmonotonic Trust Management for P2P Applications
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management langua...
Marcin Czenko, Ha Tran, Jeroen Doumen, Sandro Etal...
ENTCS
2006
103views more  ENTCS 2006»
14 years 11 months ago
A WOWA-based Aggregation Technique on Trust Values Connected to Metadata
Metadata produced by members of a diverse community of peers tend to contain low-quality or even mutually inconsistent assertions. Trust values computed on the basis of users'...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
67
Voted
ENTCS
2006
99views more  ENTCS 2006»
14 years 11 months ago
Metrics for Action-labelled Quantitative Transition Systems
This paper defines action-labelled quantitative transition systems as a general framework for combining qualitative and quantitative analysis. We define state-metrics as a natural...
Yuxin Deng, Tom Chothia, Catuscia Palamidessi, Jun...
79
Voted
ENTCS
2006
143views more  ENTCS 2006»
14 years 11 months ago
Hiproofs: A Hierarchical Notion of Proof Tree
Motivated by the concerns of theorem-proving, we generalise the notion of proof tree to that of hierarchical proof tree. Hierarchical trees extend ordinary trees by adding partial...
Ewen Denney, John Power, Konstantinos Tourlas