Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Abstract. The needs of efficient and flexible information retrieval on multistructural data stored in database and network are significantly growing. Especially, its flexibility pl...
Human faces are attractive and effective in every-day communication. In human-computer interaction, because of the lack of sufficient knowledge and appropriate tools to model and ...
A functional data-parallel language called BSML has been designed for programming Bulk-Synchronous Parallel algorithms. Many sequential algorithms do not have parallel counterpart...