Sciweavers

1403 search results - page 123 / 281
» Security Model for XML Data
Sort
View
GRID
2007
Springer
14 years 4 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
14 years 4 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...
OOPSLA
2004
Springer
14 years 3 months ago
Efficient data race and deadlock prevention in concurrent object-oriented programs
The main goal of this PhD thesis is to propose and implement a methodology for the construction of programs based on the SCOOP model, and for modular reasoning about their correct...
Piotr Nienaltowski
CCS
2008
ACM
14 years 8 days ago
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 80056A sta...
Alfred Menezes, Berkant Ustaoglu
CAISE
2005
Springer
14 years 3 months ago
Integrating Unnormalised Semi-structured Data Sources
From Proc. CAiSE05 LNCS 3520, Pages 460-474 c Springer-Verlag 2005 Semi-structured data sources, such as XML, HTML or CSV files, present special problems when performing data int...
Sasivimol Kittivoravitkul, Peter McBrien