There are a number of frameworks for modelling argumentation in logic. They incorporate a formal representation of individual arguments and techniques for comparing conflicting a...
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
The need for enterprise application integration projects leads to complex composite applications. For the sake of security and efficiency, consolidated access control policies for ...
Martin Wimmer, Alfons Kemper, Maarten Rits, Volkma...
As the complexity of industrial processes increases, it requires the use of intelligent sensors or actuators (known as Intelligent Instruments) to allow for more comprehensive and...
Richard Dapoigny, Patrick Barlatier, Laurent Foull...
Abstract. The usual context of service oriented computing is characterized by several services offering the same functionalities, new services that are continuosly deployed and oth...