Sciweavers

2838 search results - page 550 / 568
» Verifying Controlled Components
Sort
View
TES
2001
Springer
14 years 2 days ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
ACSAC
2000
IEEE
14 years 2 days ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
WMCSA
2000
IEEE
14 years 1 days ago
A Composable Framework for Secure Multi-Modal Access to Internet Services from Post-PC Devices
The Post-PC revolution is bringing information access to a wide-range of devices beyond the desktop, such as public kiosks, and mobile devices like cellular telephones, PDAs, and ...
Steven J. Ross, Jason L. Hill, Michael Y. Chen, An...
SIGGRAPH
2000
ACM
14 years 16 hour ago
Computer modelling of fallen snow
In this paper, we present a new model of snow accumulation and stability for computergraphics. Our contribution is divided into two major components, each essential for modelling ...
Paul Fearing
ICFP
1999
ACM
13 years 12 months ago
Type Inference Builds a Short Cut to Deforestation
Deforestation optimises a functional program by transforming it into another one that does not create certain intermediate data structures. Short cut deforestation is a deforestat...
Olaf Chitil