Sciweavers

5255 search results - page 110 / 1051
» Formal Methods for Privacy
Sort
View
AAMAS
2004
Springer
15 years 2 months ago
Temporal Development Methods for Agent-Based
In this paper we overview one specific approach to the formal development of multi-agent systems. This approach is based on the use of temporal logics to represent both the behavio...
Michael Fisher
243
Voted
ICDE
2009
IEEE
192views Database» more  ICDE 2009»
16 years 4 months ago
Deriving Private Information from Association Rule Mining Results
Data publishing can provide enormous benefits to the society. However, due to privacy concerns, data cannot be published in their original forms. Two types of data publishing can a...
Zutao Zhu, Guan Wang, Wenliang Du
95
Voted
FC
2009
Springer
93views Cryptology» more  FC 2009»
15 years 9 months ago
Coercion Resistant End-to-end Voting
End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been consi...
Ryan W. Gardner, Sujata Garera, Aviel D. Rubin
ICDE
2007
IEEE
131views Database» more  ICDE 2007»
15 years 8 months ago
Enhancing Secured Service Interoperability with Decentralized Orchestration
Several current research efforts in business process modeling are investigating XML-based executable formal specification languages. The availability of the latter allows modeled...
Ustun Yildiz, Claude Godart
ENTCS
2007
110views more  ENTCS 2007»
15 years 2 months ago
Data Anonymity in the FOO Voting Scheme
We study one of the many aspects of privacy, which is referred to as data anonymity, in a formal context. Data anonymity expresses whether some piece of observed data, such as a v...
Sjouke Mauw, Jan Verschuren, Erik P. de Vink