Sciweavers

793 search results - page 97 / 159
» Protocol Modeling with Model Program Composition
Sort
View
ICSOC
2009
Springer
14 years 3 months ago
An Automatic Approach to Enable Replacement of Conversational Services
Abstract. In Service Oriented Architectures (SOAs) services invoked in a composition can be replaced by other services, which are possibly discovered and bound at runtime. Most of ...
Luca Cavallaro, Elisabetta Di Nitto, Matteo Pradel...
IFIP
2010
Springer
13 years 4 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
CSFW
2005
IEEE
14 years 2 months ago
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System
We present the first cryptographically sound Dolev-Yaostyle security proof of a comprehensive electronic payment system. The payment system is a slightly simplified variant of t...
Michael Backes, Markus Dürmuth
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
14 years 3 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
IJHPCA
2008
151views more  IJHPCA 2008»
13 years 9 months ago
WE-AMBLE: a Workflow Engine To Manage Awareness in Collaborative Grid Environments
Grid computing intends to share heterogeneous resources in dynamic service-based environments. This kind of systems has the major advantages of enabling rapid composition of distr...
Pilar Herrero, José Luis Bosque, Manuel Sal...