Sciweavers

3384 search results - page 131 / 677
» More Testable Properties
Sort
View
CSFW
2010
IEEE
14 years 25 days ago
Information Flow in Credential Systems
—This paper proposes a systematic study of information flow in credential-based declarative authorization policies. It argues that a treatment in terms of information flow is n...
Moritz Y. Becker
PKC
2000
Springer
132views Cryptology» more  PKC 2000»
14 years 15 days ago
The Composite Discrete Logarithm and Secure Authentication
For the two last decades, electronic authentication has been an important topic. The first applications were digital signatures to mimic handwritten signatures for digital document...
David Pointcheval
ZUM
2000
Springer
14 years 14 days ago
Retrenchment, Refinement, and Simulation
: Retrenchment is introduced as a liberalisation of refinement intended to address some of the shortcomings of refinement as sole means of progressing from simple abstract models t...
Richard Banach, Michael Poppleton
AAAI
2007
13 years 11 months ago
Comprehending and Generating Apt Metaphors: A Web-driven, Case-based Approach to Figurative Language
Examples of figurative language can range from the explicit and the obvious to the implicit and downright enigmatic. Some simpler forms, like simile, often wear their meanings on...
Tony Veale, Yanfen Hao
AOSD
2008
ACM
13 years 11 months ago
Reasoning about aspects with common sense
There has been a lot of debate about the modularity of aspectoriented programs, and in particular the ability to reason about such programs in a modular way, although it has never...
Klaus Ostermann