Sciweavers

392 search results - page 32 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
CCS
2009
ACM
14 years 5 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
SAC
2010
ACM
13 years 11 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
GRAPHITE
2007
ACM
14 years 2 months ago
A shape hierarchy for 3D modelling from video
This paper describes an interactive method for generating a model of a scene from image data. The method uses the camera parameters and point cloud typically generated by structur...
Anton van den Hengel, Anthony R. Dick, Thorsten Th...
AIMS
2010
Springer
14 years 8 days ago
Model-Driven Service Level Management
Service-level agreements (SLA) definition and monitoring are open issues within the IT Service Management (ITSM) domain. Our main goals are to propose a model-based approach to IT ...
Anacleto Correia, Fernando Brito e Abreu
ESOP
2005
Springer
14 years 4 months ago
Analysis of an Electronic Voting Protocol in the Applied Pi Calculus
Electronic voting promises the possibility of a convenient, efficient and secure facility for recording and tallying votes in an election. Recently highlighted inadequacies of imp...
Steve Kremer, Mark Ryan