Sciweavers

1779 search results - page 237 / 356
» A Formal Model of Data Privacy
Sort
View
SAS
2001
Springer
149views Formal Methods» more  SAS 2001»
15 years 8 months ago
Analysis of Multithreaded Programs
Abstract. The field of program analysis has focused primarily on sequential programming languages. But multithreading is becoming increasingly important, both as a program structu...
Martin C. Rinard
DOOD
1997
Springer
163views Database» more  DOOD 1997»
15 years 8 months ago
On a Declarative Semantics for Web Queries
With the increasing importance of the World Wide Web as an information source, there is a growing interest for integration of Web and database technology. Several Web query languag...
Rainer Himmeröder, Georg Lausen, Bertram Lud&...
BPM
2006
Springer
149views Business» more  BPM 2006»
15 years 6 months ago
Verifying BPEL Workflows Under Authorisation Constraints
Abstract. Business Process Execution Language (BPEL), or Web Services BPEL (WS-BPEL), is the standard for specifying workflow process definition using web services. Research on for...
Zhao Xiangpeng, Antonio Cerone, Padmanabhan Krishn...
AICT
2007
IEEE
122views Communications» more  AICT 2007»
15 years 6 months ago
Towards Security Analyses of an Identity Federation Protocol for Web Services in Convergent Networks
— We describe a formal approach to the analysis of security aspects of an identity federation protocol for web services in convergent networks. This network protocol was proposed...
Maurice H. ter Beek, Corrado Moiso, Marinella Petr...
CCS
2008
ACM
15 years 6 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...