Sciweavers

813 search results - page 69 / 163
» Pipeline-centric provenance model
Sort
View
ICAIL
2007
ACM
14 years 1 months ago
Formalising argumentative story-based analysis of evidence
In the present paper, we provide a formalised version of a merged argumentative and story-based approach towards the analysis of evidence. As an application, we are able to show h...
F. J. Bex, Henry Prakken, Bart Verheij
APSEC
2004
IEEE
14 years 26 days ago
Tool Supported Development of Service-Based Systems
Service-based systems engineering is a recent paradigm that has proven useful for the development of multifunctional systems, whose functions may be used in different contexts and...
Martin Deubler, Johannes Grünbauer, Gerhard P...
DCOSS
2006
Springer
14 years 24 days ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
ASIACRYPT
2001
Springer
14 years 23 days ago
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Abstract. In this paper, we consider the problem of mutually authenticated key exchanges between a low-power client and a powerful server. We show how the Jakobsson-Pointcheval sch...
Duncan S. Wong, Agnes Hui Chan
ACSAC
2000
IEEE
14 years 22 days ago
Dynamic Access Control through Petri Net Workflows
Access control is an important protection mechanism for information systems. An access control matrix grants subjects privileges to objects. Today, access control matrices are sta...
Konstantin Knorr