Sciweavers

4595 search results - page 622 / 919
» Reasoning about Plans
Sort
View
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 4 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
ACMICEC
2006
ACM
89views ECommerce» more  ACMICEC 2006»
14 years 4 months ago
A semantic web approach to handling soft constraints in virtual organisations
In this paper we present a proposal for representing soft constraint satisfaction problems (CSPs) within the Semantic Web architecture. The proposal is motivated by the need for a...
Alun D. Preece, Stuart Chalmers, Craig McKenzie, J...
ICMCS
2005
IEEE
120views Multimedia» more  ICMCS 2005»
14 years 4 months ago
Picturefinder: Description Logics for Semantic Image Retrieval
Large amount of images need an efficient way of retrieving them. The usual approach of manually annotating images and/or providing a syntactic retrieval capability lacks flexibi...
Jean-Pierre Schober, Thorsten Hermes, Otthein Herz...
CIE
2005
Springer
14 years 4 months ago
Formalising Exact Arithmetic in Type Theory
In this work we focus on a formalisation of the algorithms of lazy exact arithmetic `a la Potts and Edalat [1]. We choose the constructive type theory as our formal verification t...
Milad Niqui
ESORICS
2005
Springer
14 years 4 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento