Sciweavers

185 search results - page 15 / 37
» SAGBI Bases Under Composition
Sort
View
HICSS
2010
IEEE
162views Biometrics» more  HICSS 2010»
14 years 2 months ago
Risk-Based Decision Support in Service Value Networks
The current trend towards dynamic and highly scalable service provisioning fosters the rise of Software as a Service (SaaS) platforms and so called Compute Clouds. The on-demand p...
Wibke Michalk, Benjamin Blau, Jochen Stö&szli...
FMCO
2009
Springer
161views Formal Methods» more  FMCO 2009»
13 years 5 months ago
The How and Why of Interactive Markov Chains
This paper reviews the model of interactive Markov chains (IMCs, for short), an extension of labelled transition systems with exponentially delayed transitions. We show that IMCs a...
Holger Hermanns, Joost-Pieter Katoen
CSFW
1996
IEEE
13 years 11 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
EUROCRYPT
2005
Springer
14 years 1 months ago
Universally Composable Password-Based Key Exchange
Abstract. We propose and realize a definition of security for passwordbased key exchange within the framework of universally composable (UC) security, thus providing security guar...
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Li...
BIRTHDAY
2004
Springer
14 years 1 months ago
Retracing the Semantics of CSP
CSP was originally introduced as a parallel programming language in which sequential imperative processes execute concurrently and communicate by synchronized input and output. The...
Stephen D. Brookes