We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
Web service-based workflow management systems have garnered considerable attention for automating and scheduling dependent operations. Such systems often support user preferences,...
David Chiu, Sagar Deshpande, Gagan Agrawal, Rongxi...
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
Data-Providing (DP) services allow query-like access to organizations' data via web services. The invocation of a DP service results in the execution of a query over data sour...
How to measure and model the similarity between different music items is one of the most fundamental yet challenging research problems in music information retrieval. This paper ...
Bingjun Zhang, Qiaoliang Xiang, Ye Wang, Jialie Sh...