Sciweavers

2043 search results - page 55 / 409
» Reasoning About Security Models
Sort
View
ASIAN
2006
Springer
116views Algorithms» more  ASIAN 2006»
14 years 2 months ago
Secrecy Analysis in Protocol Composition Logic
We present formal proof rules for inductive reasoning about the way that data transmitted on the network remains secret from a malicious attacker. Extending a compositional protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
AGENTS
1997
Springer
14 years 2 months ago
Decision Making and Plan Management by Autonomous Agents: Theory, Implementation and Applications
A generic architecture for autonomous agents is presented. In commonwith other current proposals the agent is capable of reacting to and reasoning about events which occur in its ...
Subrata Kumar Das, John Fox, D. Elsdon, Peter Hamm...
JSS
2007
75views more  JSS 2007»
13 years 10 months ago
A rationale-based architecture model for design traceability and reasoning
Large systems often have a long life-span and comprise many intricately related elements. The verification and maintenance of these systems require a good understanding of their ...
Antony Tang, Yan Jin, Jun Han
CCS
2005
ACM
14 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
CMPB
2010
97views more  CMPB 2010»
13 years 9 months ago
A ligand predication tool based on modeling and reasoning with imprecise probabilistic knowledge
Ligand prediction has been driven by a fundamental desire to understand more about how biomolecules recognize their ligands and by the commercial imperative to develop new drugs. ...
Weiru Liu, Anbu Yue, David J. Timson