Sciweavers

820 search results - page 114 / 164
» Action Languages
Sort
View
ICALP
2005
Springer
14 years 1 months ago
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
Abstract. We describe a cryptographically sound formal logic for proving protocol security properties without explicitly reasoning about probability, asymptotic complexity, or the ...
Anupam Datta, Ante Derek, John C. Mitchell, Vitaly...
SEKE
2005
Springer
14 years 1 months ago
Formal Reasoning about Emergent Behaviours of Multi-Agent Systems
Abstract. Emergent behaviour (EB) is a common phenomenon in multi-agent systems (MAS) where autonomous agents perform certain actions with only limited access to local information ...
Hong Zhu
SOFSEM
2005
Springer
14 years 1 months ago
Tier Aspect Model Based on Updatable Views
The tier aspect model addresses Aspect Oriented Programming (AOP) in the context of database applications. It is a new technique of separation of concerns through tiers implemented...
Radoslaw Adamus, Kazimierz Subieta
IFIP
2004
Springer
14 years 1 months ago
Complementing Computational Protocol Analysis with Formal Specifications
Abstract The computational proof model of Bellare and Rogaway for cryptographic protocol analysis is complemented by providing a formal specification of the actions of the adversa...
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
ISI
2003
Springer
14 years 1 months ago
Active Database Systems for Monitoring and Surveillance
In many intelligence and security tasks it is necessary to monitor data in database in order to detect certain events or changes. Currently, database systems offer triggers to pro...
Antonio Badia