Sciweavers

565 search results - page 69 / 113
» A logic for authorization provenance
Sort
View
CADE
2006
Springer
14 years 9 months ago
Automation of Recursive Path Ordering for Infinite Labelled Rewrite Systems
Abstract. Semantic labelling is a transformational technique for proving termination of Term Rewriting Systems (TRSs). Only its variant with finite sets of labels was used so far i...
Adam Koprowski, Hans Zantema
SEMWEB
2009
Springer
14 years 3 months ago
Ontologies for User Interface Integration
There are different strategies to integrate software systems: integration on the data layer, on the business logic layer, and on the user interface layer. The latter area, recent...
Heiko Paulheim
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 3 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
FUZZIEEE
2007
IEEE
14 years 3 months ago
FrIDA - A Free Intelligent Data Analysis Toolbox
—This paper describes a Java-based graphical user interface to a large number of data analysis programs the first author has written in C over the years. In addition, this toolb...
Christian Borgelt, Gil Gonzáles-Rodrí...
IEEESCC
2007
IEEE
14 years 3 months ago
Design Principles for B2B Services - An Evaluation of Two Alternative Service Designs
A service-oriented architecture (SOA) promises a more flexible intra- and interorganizational integration of heterogeneous application systems. The central design element of a SOA...
Christine Legner, Tobias Vogel