Sciweavers

208 search results - page 11 / 42
» Relations Among Privacy Notions
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen
MOBISYS
2007
ACM
14 years 8 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
ESORICS
2009
Springer
14 years 9 months ago
Secure Ownership and Ownership Transfer in RFID Systems
We present a formal model for stateful security protocols. This model is used to define ownership and ownership transfer as concepts as well as security properties. These definitio...
Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, Pi...
AGENTS
2001
Springer
14 years 1 months ago
A knowledge level software engineering methodology for agent oriented programming
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
LFCS
1994
Springer
14 years 1 months ago
Strong Normalization in a Non-Deterministic Typed Lambda-Calculus
In a previous paper [4], we introduced a non-deterministic -calculus (-LK) whose type system corresponds exactly to Gentzen's cut-free LK [9]. This calculus, however, cannot b...
Philippe de Groote