Sciweavers

12637 search results - page 141 / 2528
» Security for Extensible Systems
Sort
View
CAISE
2003
Springer
14 years 2 months ago
Ontology Mapping through Analysis of Model Extension
The overall problem addressed in this paper is to improve semantic interoperability in heterogeneous systems. Normally, the semantics of data is carried by ontology (concept model)...
Xiaomeng Su, Terje Brasethvik, Sari Hakkarainen
ECBS
2002
IEEE
115views Hardware» more  ECBS 2002»
14 years 2 months ago
An Extensible Software Architecture for Mobile Components
This paper presents a generic software architecture for large-scale distributed applications in which mobile agents are an integral part. We developed this architecture through th...
Dag Johansen, Kåre J. Lauvset, Keith Marzull...
MPC
2010
Springer
152views Mathematics» more  MPC 2010»
14 years 1 months ago
Lucy-n: a n-Synchronous Extension of Lustre
Synchronous functional languages such as Lustre or Lucid Synchrone define a restricted class of Kahn Process Networks which can be executed with no buffer. Every expression is as...
Louis Mandel, Florence Plateau, Marc Pouzet
STOC
2002
ACM
130views Algorithms» more  STOC 2002»
14 years 9 months ago
Secure multi-party quantum computation
Secure multi-party computing, also called secure function evaluation, has been extensively studied in classical cryptography. We consider the extension of this task to computation...
Claude Crépeau, Daniel Gottesman, Adam Smit...
ESORICS
2008
Springer
13 years 11 months ago
On the Security of Delegation in Access Control Systems
Delegation is a mechanism that allows a user A to act on another user B's behalf by making B's access rights available to A. It is well recognized as an important mechani...
Qihua Wang, Ninghui Li, Hong Chen