Sciweavers

237 search results - page 33 / 48
» Just enough tabling
Sort
View
ESORICS
2010
Springer
13 years 8 months ago
On E-Vote Integrity in the Case of Malicious Voter Computers
Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was ide...
Sven Heiberg, Helger Lipmaa, Filip van Laenen
DBSEC
2009
110views Database» more  DBSEC 2009»
13 years 8 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...
CORR
2007
Springer
147views Education» more  CORR 2007»
13 years 7 months ago
Model Checking Synchronized Products of Infinite Transition Systems
Formal verification using the model checking paradigm has to deal with two aspects: The system models are structured, often as products of components, and the specification logic...
Stefan Wöhrle, Wolfgang Thomas
VLDB
2002
ACM
74views Database» more  VLDB 2002»
13 years 7 months ago
Provisions and Obligations in Policy Management and Security Applications
Policies are widely used in many systems and applications. Recently, it has been recognized that a "yes/no" response to every scenario is just not enough for many modern...
Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wan...
IOR
2008
113views more  IOR 2008»
13 years 6 months ago
Finding Supply Function Equilibria with Asymmetric Firms
Abstract Firms compete in supply functions when they offer a schedule of prices and quantities into a market; for example, this occurs in many wholesale electricity markets. We stu...
Edward J. Anderson, Xinmin Hu