Sciweavers

4636 search results - page 730 / 928
» Modelling and Validation with VipTool
Sort
View
DAM
2006
121views more  DAM 2006»
13 years 9 months ago
Fine-grained forward-secure signature schemes without random oracles
We propose the concept of fine-grained forward-secure signature schemes. Such signature schemes not only provide non-repudiation w.r.t. past time periods the way ordinary forward-...
Jan Camenisch, Maciej Koprowski
IS
2006
13 years 9 months ago
Composition of Semantic Web services using Linear Logic theorem proving
This paper introduces a method for automatic composition of Semantic Web services using Linear Logic (LL) theorem proving. The method uses a Semantic Web service language (DAML-S)...
Jinghai Rao, Peep Küngas, Mihhail Matskin
DA
2007
69views more  DA 2007»
13 years 9 months ago
e-Participation and Decision Analysis
Decision analytic methods are now used frequently to help articulate and structure debate and deliberations among citizens and stakeholders in societal decisions. Methods vary, bu...
Simon French, David Ríos Insua, Fabrizio Ru...
JOT
2008
122views more  JOT 2008»
13 years 9 months ago
UML and Object Oriented Drama
Readers of this article have probably seen, at least once, diagrams produced using the UML (Unified Modeling Language). Some of you have perhaps used UML for your own work and kno...
Luca Vetti Tagliati, Carlo Caloro
JPDC
2006
87views more  JPDC 2006»
13 years 9 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...