Sciweavers

328 search results - page 20 / 66
» On the Enactability of Business Protocols
Sort
View
AAAI
2007
14 years 7 days ago
A Modular Action Description Language for Protocol Composition
Protocols are modular abstractions that capture patterns of interaction among agents. The compelling vision behind protocols is to enable creating customized interactions by refi...
Nirmit Desai, Munindar P. Singh
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 11 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
ENTCS
2007
112views more  ENTCS 2007»
13 years 10 months ago
A Calculus of Global Interaction based on Session Types
This paper proposes a calculus for describing communication-centred programs and discusses its use through a formal description of several use cases from real business protocols. ...
Marco Carbone, Kohei Honda, Nobuko Yoshida
AAMAS
2007
Springer
13 years 10 months ago
An algebra for commitment protocols
Protocols enable unambiguous, smooth interactions among agents. Commitments among agents are a powerful means of developing protocols. Commitments enable flexible execution of pro...
Ashok U. Mallya, Munindar P. Singh
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
14 years 4 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...