Sciweavers

503 search results - page 17 / 101
» Authenticity by tagging and typing
Sort
View
CORR
2004
Springer
120views Education» more  CORR 2004»
13 years 7 months ago
Validating a Web Service Security Abstraction by Typing
Abstraction by Typing Andrew D. Gordon Microsoft Research Riccardo Pucella Cornell University An XML web service is, to a first approximation, an RPC service in which requests and...
Andrew D. Gordon, Riccardo Pucella
ESORICS
2009
Springer
14 years 8 months ago
Reliable Evidence: Auditability by Typing
Abstract. Many protocols rely on audit trails to allow an impartial judge to verify a posteriori some property of a protocol run. However, in current practice the choice of what da...
Nataliya Guts, Cédric Fournet, Francesco Za...
HICSS
2009
IEEE
103views Biometrics» more  HICSS 2009»
14 years 2 months ago
Knowledge Workers and the Realm of Social Tagging
Social tagging is a relatively new type of social software that stores user-generated textual keywords to describe a resource or aspects of that resource. In this paper we explore...
Ralph Boeije, Gwendolyn L. Kolfschoten, Pieter de ...
EUSAI
2004
Springer
14 years 28 days ago
Super-distributed RFID Tag Infrastructures
Abstract. With the emerging mass production of very small, cheap Radio Frequency Identification (RFID) tags, it is becoming feasible to deploy such tags on a large scale. In this ...
Jürgen Bohn, Friedemann Mattern
APLAS
2003
ACM
14 years 24 days ago
A Typeful and Tagless Representation for XML Documents
When constructing programs to process XML documents, we immediately face the question as to how XML documents should be represented internally in the programming language we use. C...
Dengping Zhu, Hongwei Xi