Computer Laboratory


Alan S. Abrahams and David M. Eyers and Jean M. Bacon. A Coverage Determination Mechanism for Checking Business Contracts Against Organizational Policies. In Proceedings of the 3rd VLDB Workshop on Technologies for E-Services (TES'02). Lecture Notes in Computer Science 2444., pages 97-106, Hong Kong, China, August 2002. (c) Springer Verlag. [ bib | .html | .ps | .pdf ]
Alan S. Abrahams and David M. Eyers and Jean M. Bacon. An Asynchronous Rule-based Approach for Business Process Automation Using Obligations. In Proceedings of the 3rd ACM SIGPLAN Workshop on Rule-Based Programming (RULE'02), pages 93-103, Pittsburgh, Pennsylvania, October 2002. [ bib | http ]
Alan S. Abrahams and David M. Eyers and Jean M. Bacon. Mechanical Consistency Analysis for Business Contracts and Policies. In Proceedings of the 5th International Conference on Electronic Commerce Research (ICECR5), pages 1-18, Montreal, Canada, October 2002. [ bib | .ps | .pdf ]
Alan S. Abrahams and Jean M. Bacon. A Software Implementation of Kimbrough's Disquotation Theory for Representing and Enforcing Electronic Commerce Contracts. Journal of Group Decision and Negotiation, 11(6):487-524, 2002. [ bib | http ]
Alan S. Abrahams and Jean M. Bacon. The Life and Times of Identified, Situated, and Conflicting Norms. In Proceedings of the 6th International Workshop on Deontic Logic in Computer Science (DEON'02), pages 3-20, London, England, May 2002. [ bib | www: | .ps | .pdf ]
Alan S. Abrahams and Steven O. Kimbrough. Treating Disjunctive Obligation and Conjunctive Action in Event Semantics with Disquotation. Working Paper Series 02-03-01, Wharton Business School, Philadelphia, Pennsylvania, March 2002. [ bib | .pdf ]
J. Bacon, K. Moody, and W. Yao. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC), 5(4):492-540, November 2002. [ bib | http ]
Jean Bacon and Ken Moody. Adaptive middleware: Toward open, secure, widely distributed services. Communications of the ACM, 45(6):59-63, June 2002. [ bib | http ]
András Belokosztolszki and Ken Moody. Meta-policies for distributed role-based access control systems. In Policy 2002: IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, pages 106-115, June 2002. [ bib | .ps | .pdf ]
Jon Crowcroft, Jean Bacon, Peter Pietzuch, George Coulouris, and Hani Naguib. Channel Islands in a Reflective Ocean: Large-Scale Event Distribution in Heterogeneous Networks. IEEE Communications Magazine, 40(9):112-115, September 2002. [ bib | .pdf ]
Jon Crowcroft and Ian Pratt. Peer to Peer: Peering into the Future. In Advanced Lectures on Networking, NETWORKING 2002, volume 2497 of LNCS, pages 1-19. Springer Verlag, 2002. [ bib | http ]
Michael Norrish, Peter Sewell, and Keith Wansbrough. Rigour is good for you, and feasible: reflections on formal treatments of C and UDP sockets. In Proceedings of 10th ACM SIGOPS European Workshop (Saint-Emilion), pages 49-53, September 2002. [ bib | .ps ]
Peter R. Pietzuch and Jean M. Bacon. Hermes: A Distributed Event-Based Middleware Architecture. In Proc. of the 1st Int. Workshop on Distributed Event-Based Systems (DEBS'02), pages 611-618, Vienna, Austria, July 2002. [ bib | .ps | .pdf ]
Peter R Pietzuch and Brian Shand. A Framework for Object-Based Event Composition in Distributed Systems. Malaga, Spain, June 2002. Presented at the 12th International Network for PhD Students in Object Oriented Systems (PhDOOS) Workshop. [ bib | .ps | .pdf ]
Andrei Serjantov. Anonymizing censorship resistant systems. In Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002), March 2002. [ bib | .pdf ]
Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies, volume 2482 of LNCS, San Francisco, CA, April 2002. [ bib | .html | .ps ]
Andrei Serjantov, Roger Dingledine, and Paul Syverson. From a trickle to a flood: Active attacks on several mix types. In Fabien Petitcolas, editor, 5th Workshop on Information Hiding, volume 2578 of LNCS, pages 36-52. Springer-Verlag, October 2002. [ bib ]
Peter Sewell. From rewrite rules to bisimulation congruences. Theoretical Computer Science, 274(1-2):183-230, March 2002. [ bib | .ps.gz ]
Brian Shand and Jean Bacon. Policies in accountable contracts. In Policy 2002: IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, pages 80-91, Monterey, CA, USA, June 2002. [ bib | .pdf ]
Keith Wansbrough, Michael Norrish, Peter Sewell, and Andrei Serjantov. Timing UDP: mechanized semantics for sockets, threads and failures. In Proceedings of ESOP 2002: European Symposium on Programming (Grenoble) LNCS 2305, pages 278-294, April 2002. [ bib | .ps ]

This file has been generated by bibtex2html 1.87.