Sciweavers

2270 search results - page 359 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
BIRTHDAY
2003
Springer
15 years 9 months ago
A Formal Basis for Reasoning on Programmable QoS
Abstract. The explicit management of Quality of Service (QoS) of network connectivity, such as, e.g., working cost, transaction support, and security, is a key requirement for the ...
Rocco De Nicola, Gian Luigi Ferrari, Ugo Montanari...
135
Voted
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters
MDM
2009
Springer
269views Communications» more  MDM 2009»
15 years 10 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
GROUP
2003
ACM
15 years 9 months ago
Increasing workplace independence for people with cognitive disabilities by leveraging distributed cognition among caregivers an
In this paper we describe a current group configuration that is used to support people with cognitive disabilities (hereinafter referred to as “clients”) in the workplace. A c...
Stefan Carmien, Rogerio DePaula, Andrew Gorman, An...
ESOP
2008
Springer
15 years 5 months ago
Verification of Higher-Order Computation: A Game-Semantic Approach
Abstract. We survey recent developments in an approach to the verification of higher-order computation based on game semantics. Higherorder recursion schemes are in essence (progra...
C.-H. Luke Ong