Sciweavers

CSI
2007
89views more  CSI 2007»
13 years 11 months ago
Writing and executing ODP computational viewpoint specifications using Maude
The Reference Model of Open Distributed Processing (RM-ODP) is a joint standardization effort by ITU-T and ISO/IEC for the specification of large open distributed systems. RM-ODP ...
José Raúl Romero, Antonio Vallecillo...
CSI
2007
91views more  CSI 2007»
13 years 11 months ago
Implementing regular cash with blind fixed-value electronic coins
We propose a generic framework for the development of an off-line peer-to-peer electronic payment system with fixed-value electronic coins. The proposed scheme simulates the issua...
Dimitrios Lekkas, Diomidis Spinellis
CSI
2007
96views more  CSI 2007»
13 years 11 months ago
A common criteria based security requirements engineering process for the development of secure information systems
In order to develop security critical Information Systems, specifying security quality requirements is vitally important, although it is a very difficult task. Fortunately, there ...
Daniel Mellado, Eduardo Fernández-Medina, M...
CSI
2007
54views more  CSI 2007»
13 years 11 months ago
A practical verifiable multi-secret sharing scheme
C.-C. Yang, T.-Y. Chang, M.-S. Hwang [C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation 151 (2004) 483–490] proposed...
Jian-jie Zhao, Jianzhong Zhang 0005, Rong Zhao
CSI
2007
83views more  CSI 2007»
13 years 11 months ago
A model-driven choreography conceptual framework
A number of languages exist that try to model the external visible behavior of services. However, they constitute incomplete solutions, either because, they do not include proper ...
Sinuhé Arroyo, Alistair Duke, José M...
CSI
2007
122views more  CSI 2007»
13 years 11 months ago
Formalization of the RM-ODP foundations based on the Triune Continuum Paradigm
The subject of research in this paper is RM-ODP, an ISO/ITU-T international standard. We investigate an important challenge that the standard faces, specifically the absence of a ...
Andrey Naumenko, Alain Wegmann
CSI
2007
192views more  CSI 2007»
13 years 11 months ago
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
In 2002, Chien et al. proposed an efficient remote authentication scheme using smart cards, in which only few hashing operations are required. Later, Ku et al. gave an improved sc...
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhamma...
CSI
2007
86views more  CSI 2007»
13 years 11 months ago
Using UML to model relational database operations
The Unified Modeling Language (UML) is being used as the de-facto standard in the software industry. With the adoption of UML 2.0, the new enhancements allow this version to desc...
Eunjee Song, Shuxin Yin, Indrakshi Ray
CSI
2007
98views more  CSI 2007»
13 years 11 months ago
An architecture for flexible scheduling in Profibus networks
Recently, much attention has been given to the need to endow industrial communication networks used in real-time systems with flexible scheduling. This allows control systems to a...
J. Silvestre, V. Sempere