Sciweavers

1833 search results - page 124 / 367
» Mechanized Verification with Sharing
Sort
View
164
Voted
CCS
2010
ACM
15 years 2 months ago
Developing security protocols by refinement
We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides sformation of abstract security goals into protocols that are s...
Christoph Sprenger, David A. Basin
IFM
2010
Springer
147views Formal Methods» more  IFM 2010»
15 years 2 months ago
Symbolic Model-Checking of Optimistic Replication Algorithms
Abstract. The Operational Transformation (OT) approach, used in many collaborative editors, allows a group of users to concurrently update replicas of a shared object and exchange ...
Hanifa Boucheneb, Abdessamad Imine, Manal Najem
GCC
2005
Springer
15 years 10 months ago
Dynamic Models of Knowledge in Virtual Organizations
The dynamics of knowledge is important for virtual organizations (VOs) knowledge management (KM) to improve the fast response capabilities and flexible problem solving capabilities...
Yan Ren, Xueshan Luo
ISCAPDCS
2001
15 years 6 months ago
CAGISTrans: A Transactional Framework for Cooperative Work
The problem addressed in this paper deals with data sharing as a means to cooperate. Our main focus is on transactional mechanisms to manage concurrent accesses to (partially) sha...
Heri Ramampiaro, Mads Nygård
IACR
2011
87views more  IACR 2011»
14 years 4 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao