Sciweavers

2272 search results - page 283 / 455
» Provable Data Privacy
Sort
View
115
Voted
SAFECOMP
1998
Springer
15 years 6 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha
BIOSURVEILLANCE
2008
Springer
15 years 4 months ago
Dynamic Network Model for Predicting Occurrences of Salmonella at Food Facilities
Salmonella is among the most common food borne illnesses which may result from consumption of contaminated products. In this paper we model the co-occurrence data between USDA-cont...
Purnamrita Sarkar, Lujie Chen, Artur Dubrawski
125
Voted
CSFW
2008
IEEE
15 years 4 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
120
Voted
ISICT
2003
15 years 4 months ago
Security protocols for 2G and 3G wireless communications
Wireless communications are being driven by the need for providing network access to mobile or nomadic computing devices. The need for wireless access to a network is evident in c...
T. Newe, Tom Coffey
132
Voted
ESORICS
2010
Springer
15 years 3 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth