Sciweavers

578 search results - page 80 / 116
» Deriving Semantic Models from Privacy Policies
Sort
View
DATASCIENCE
2006
105views more  DATASCIENCE 2006»
13 years 9 months ago
Data publication in the open access initiative
The `Berlin Declaration' was published in 2003 as a guideline to policy makers to promote the Internet as a functional instrument for a global scientific knowledge base. Beca...
Jens Klump, Roland Bertelmann, Jan Brase, Michael ...
CCS
2008
ACM
13 years 11 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
FM
1999
Springer
161views Formal Methods» more  FM 1999»
14 years 1 months ago
Combining Theorem Proving and Continuous Models in Synchronous Design
Support for system speci cation in terms of modelling and simulation environments has become a common practice in safety-critical applications. Also, a current trend is the automat...
Simin Nadjm-Tehrani, Ove Åkerlund
PDSE
1998
131views more  PDSE 1998»
13 years 10 months ago
A Formally Founded Description Technique for Business Processes
As a means of modeling typical system behavior, we present a description technique for business processes derived from data flow nets and provide it with a formal semantics based ...
Veronika Thurner
COLCOM
2009
IEEE
14 years 1 months ago
Toward synchronization between decentralized orchestrations of composite web services
—Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation poin...
Walid Fdhila, Claude Godart