Sciweavers

41 search results - page 7 / 9
» The Correctness of Crypto Transaction Sets
Sort
View
CRYPTO
2005
Springer
125views Cryptology» more  CRYPTO 2005»
14 years 2 months ago
Secure Computation Without Authentication
In the setting of secure multiparty computation, a set of parties wish to jointly compute some function of their inputs. Such a computation must preserve certain security propertie...
Boaz Barak, Ran Canetti, Yehuda Lindell, Rafael Pa...
CSFW
2002
IEEE
14 years 1 months ago
Security Protocol Design via Authentication Tests
We describe a protocol design process, and illustrate its use by creating ATSPECT, an Authentication Test-based Secure Protocol for Electronic Commerce Transactions. The design pr...
Joshua D. Guttman
FORTE
2007
13 years 10 months ago
Exploring the Connection of Choreography and Orchestration with Exception Handling and Finalization/Compensation
Web service choreography describes protocols for multiparty collaboration, whereas orchestration focuses on single peers. One key requirement of choreography is to support transact...
Hongli Yang, Xiangpeng Zhao, Chao Cai, Zongyan Qiu
JWSR
2008
98views more  JWSR 2008»
13 years 8 months ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart
HASKELL
2009
ACM
14 years 3 months ago
A compositional theory for STM Haskell
We address the problem of reasoning about Haskell programs that use Software Transactional Memory (STM). As a motivating example, we consider Haskell code for a concurrent non-det...
Johannes Borgström, Karthikeyan Bhargavan, An...