Sciweavers

4286 search results - page 80 / 858
» Formalizing Service Interactions
Sort
View
123
Voted
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 9 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
116
Voted
ELPUB
2003
ACM
15 years 7 months ago
Mobile Internet Services in Japan and Europe: Examining Industrial Organisation in Relation to Interactive Electronic Publishing
Based on our field and desk-research , this paper will discuss the current situation of mobile telephones in relation to electronic publishing—a convergence that remains yet to ...
Myriam Diocaretz, Richard Tee
177
Voted
IRI
2009
IEEE
15 years 9 months ago
An Agent-based Formal Framework for Modeling and Simulating Supply Chains
We propose an open and extensible agent-based formal framework for modeling and simulating supply chains. Since structures and behaviors of supply chains can be very different bas...
Li Tan, Shenghan Xu, Benjamin Meyer, Brock Erwin
154
Voted
ICWS
2007
IEEE
15 years 4 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
121
Voted
DAC
2006
ACM
16 years 3 months ago
Formal analysis of hardware requirements
Formal languages are increasingly used to describe the functional requirements (specifications) of circuits. These requirements are used as a means to communicate design intent an...
Ingo Pill, Simone Semprini, Roberto Cavada, Marco ...