Sciweavers

145 search results - page 25 / 29
» Preserving Privacy Based on Semantic Policy Tools
Sort
View
SEMWEB
2009
Springer
14 years 2 months ago
Coloring RDF Triples to Capture Provenance
Abstract. Recently, the W3C Linking Open Data effort has boosted the publication and inter-linkage of large amounts of RDF datasets on the Semantic Web. Various ontologies and know...
Giorgos Flouris, Irini Fundulaki, Panagiotis Pedia...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
ESORICS
2002
Springer
14 years 7 months ago
Formal Security Analysis with Interacting State Machines
We introduce the ISM approach, a framework for modeling and verifying reactive systems in a formal, even machine-checked, way. The framework has been developed for applications in ...
David von Oheimb, Volkmar Lotz
OOPSLA
2001
Springer
14 years 5 days ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
ENASE
2009
179views Hardware» more  ENASE 2009»
13 years 5 months ago
Evolving System's Modeling and Simulation through Reflective Petri Nets
Abstract. The design of dynamic discrete-event systems calls for adequate modeling formalisms and tools to manage possible changes occurring during system's lifecycle. A commo...
Lorenzo Capra, Walter Cazzola