Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Designing Exception Handling Using Event-B

    The design of exception handling is a complex task requiring insight and domain expertise to ensure that potential abnormal conditions are identified and a recovery process is designed to return the system to ...

    Asieh Salehi Fathabadi, Colin Snook, Thai Son Hoang in Rigorous State-Based Methods (2024)

  2. No Access

    Chapter and Conference Paper

    Verifying System-Level Security of a Smart Ballot Box

    Event-B, a refinement-based formal modelling language, has traditionally focused on safety, but now increasingly finds a new role in develo** secure systems. In this paper we take a fresh look at security an...

    Dana Dghaym, Thai Son Hoang, Michael Butler, Runshan Hu in Rigorous State-Based Methods (2021)

  3. No Access

    Chapter

    Healthcare Data Management by Using Blockchain Technology

    Electronic healthcare solutions permit interconnecting hospitals and clinics to enable sharing of electronic medical records according to interoperability and legal standards. However, healthcare record data i...

    Soeren Bittins, Gerhard Kober, Andrea Margheri in Applications of Blockchain in Healthcare (2021)

  4. Chapter and Conference Paper

    Towards Adaptive Access Control

    Access control systems are nowadays the first line of defence of modern IT systems. However, their effectiveness is often compromised by policy miscofigurations that can be exploited by insider threats. In thi...

    Luciano Argento, Andrea Margheri in Data and Applications Security and Privacy… (2018)

  5. Chapter and Conference Paper

    Obscuring Provenance Confidential Information via Graph Transformation

    Provenance is a record that describes the people, institutions, entities, and activities involved in producing, influencing, or delivering a piece of data or a thing. In particular, the provenance of informati...

    Jamal Hussein, Luc Moreau, Vladimiro Sassone in Trust Management IX (2015)

  6. No Access

    Chapter and Conference Paper

    Descriptive Types for Linked Data Resources

    This work introduces the notion of descriptive ty**. Type systems are typically prescriptive in the sense that they prescribe a space of permitted programs. In contrast, descriptive types assigned to resourc...

    Gabriel Ciobanu, Ross Horne, Vladimiro Sassone in Perspectives of System Informatics (2015)

  7. No Access

    Chapter and Conference Paper

    An HMM-Based Reputation Model

    In modern global networks, principals usually have incomplete information about each other. Therefore trust and reputation frameworks have been recently adopted to maximise the security level by basing decisio...

    Ehab ElSalamouny, Vladimiro Sassone in Advances in Security of Information and Co… (2013)

  8. No Access

    Book and Conference Proceedings

    Trustworthy Global Computing

    6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers

    Roberto Bruni, Vladimiro Sassone in Lecture Notes in Computer Science (2012)

  9. No Access

    Book and Conference Proceedings

    Mathematical Foundations of Computer Science 2012

    37th International Symposium, MFCS 2012, Bratislava, Slovakia, August 27-31, 2012. Proceedings

    Branislav Rovan, Vladimiro Sassone in Lecture Notes in Computer Science (2012)

  10. No Access

    Chapter and Conference Paper

    Operational Semantics for SPARQL Update

    Concurrent fine grained updates are essential for using RDF stores in dynamic modern Web applications, where users increasingly contribute content as often as they read content. SPARQL Update is a language pro...

    Ross Horne, Vladimiro Sassone, Nicholas Gibbins in The Semantic Web (2012)

  11. Chapter and Conference Paper

    A Game-Theoretic Analysis of Cooperation in Anonymity Networks

    Anonymity systems are of paramount and growing importance in communication networks. They rely on users to cooperate to the realisation of an effective anonymity service. Yet, existing systems are marred by th...

    Mu Yang, Vladimiro Sassone, Sardaouna Hamadou in Principles of Security and Trust (2012)

  12. Chapter and Conference Paper

    Minimising Anonymity Loss in Anonymity Networks under DoS Attacks

    Anonymity is a security property of paramount importance as it helps to protect users’ privacy by ensuring that their identity remains unknown. Anonymity protocols generally suffer from denial of service (DoS)...

    Mu Yang, Vladimiro Sassone in Information and Communications Security (2011)

  13. No Access

    Book and Conference Proceedings

    Theoretical Computer Science

    6th IFIP TC 1/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings

    Cristian S. Calude, Vladimiro Sassone in IFIP Advances in Information and Communication Technology (2010)

  14. No Access

    Chapter and Conference Paper

    HMM-Based Trust Model

    Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either assume fixed behaviour for the...

    Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielsen in Formal Aspects in Security and Trust (2010)

  15. No Access

    Chapter and Conference Paper

    Probable Innocence in the Presence of Independent Knowledge

    We analyse the Crowds anonymity protocol under the novel assumption that the attacker has independent knowledge on behavioural patterns of individual users. Under such conditions we study, reformulate and extend ...

    Sardaouna Hamadou, Catuscia Palamidessi in Formal Aspects in Security and Trust (2010)

  16. No Access

    Chapter and Conference Paper

    Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols

    The existing analysis of the Crowds anonymity protocol assumes that a participating member is either ’honest’ or ’corrupted.’ This paper generalises this analysis so that each member is assumed to maliciously ...

    Vladimiro Sassone, Ehab ElSalamouny, Sardaouna Hamadou in Trustworthly Global Computing (2010)

  17. No Access

    Chapter and Conference Paper

    Trust in Anonymity Networks

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as...

    Vladimiro Sassone, Sardaouna Hamadou, Mu Yang in CONCUR 2010 - Concurrency Theory (2010)

  18. No Access

    Chapter

    Models of Computation: A Tribute to Ugo Montanari’s Vision

    Ugo’s research activity in the area ofModels of Computation (MoC, for short) has been prominent, influential and broadly scoped. Ugo’s trademark is that undefinable ability to understand and distill computatio...

    Roberto Bruni, Vladimiro Sassone in Concurrency, Graphs and Models (2008)

  19. Chapter and Conference Paper

    Structural Operational Semantics for Stochastic Process Calculi

    A syntactic framework called SGSOS, for defining well-behaved Markovian stochastic transition systems, is introduced by analogy to the GSOS congruence format for nondeterministic processes. Stochastic bisimila...

    Bartek Klin, Vladimiro Sassone in Foundations of Software Science and Comput… (2008)

  20. No Access

    Chapter and Conference Paper

    Towards a Formal Framework for Computational Trust

    We define a mathematical measure for the quantitative comparison of probabilistic computational trust systems, and use it to compare a well-known class of algorithms based on the so-called beta model. The main...

    Vladimiro Sassone, Karl Krukow, Mogens Nielsen in Formal Methods for Components and Objects (2007)

previous disabled Page of 3