Sciweavers

813 search results - page 32 / 163
» Pipeline-centric provenance model
Sort
View
CRYPTO
2012
Springer
215views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full sec...
Allison B. Lewko, Brent Waters
IMAGING
2001
13 years 9 months ago
Darwinism of Color Image Difference Models
The world of color image difference modeling can be considered relatively young, when compared with the rich history of general color difference equations. While young, this area ...
Garrett M. Johnson, Mark D. Fairchild
SDL
2007
192views Hardware» more  SDL 2007»
13 years 9 months ago
OpenComRTOS: An Ultra-Small Network Centric Embedded RTOS Designed Using Formal Modeling
Abstract. OpenComRTOS is one of the few Real-Time Operating Systems (RTOS) for embedded systems that was developed using formal modeling techniques. The goal was to obtain a proven...
Eric Verhulst, Gjalt G. de Jong
JSYML
2000
103views more  JSYML 2000»
13 years 7 months ago
A Model Complete Theory of Valued D-Fields
The notion of a D-ring, generalizing that of a differential or a difference ring, is introduced. Quantifier elimination and a version of the AxKochen-Ershov principle is proven for...
Thomas Scanlon
DBSEC
2007
131views Database» more  DBSEC 2007»
13 years 9 months ago
Dynamic Event-Based Access Control as Term Rewriting
Abstract. Despite the widespread adoption of Role-based Access Control (RBAC) models, new access control models are required for new applications for which RBAC may not be especial...
Clara Bertolissi, Maribel Fernández, Steve ...