Learn More
Web services will soon handle users' private information. They'll need to provide privacy guarantees to prevent this delicate information from ending up in the wrong hands. More generally, Web services will need to reason about their users' policies that specify who can access private information and under what conditions. These requirements are even more(More)
Semantic Web Services (SWSs) promise to provide solutions to the challenges associated with automated discovery, dynamic composition , enactment, and other tasks associated with managing and using service-based systems. One of the barriers to a wider adoption of SWS technology is the lack of tools for creating SWS specifications. OWLS is one of the major(More)
We outline a Semantic Web approach for considering the impact of context information on the trustworthiness of communication. We show that the contexts of message sender, receiver, and mediating network can have influence on the degree of trust the receiver assigns to a message. We define ontologies to capture context-sensitive messaging and trust, as well(More)
The work presented here aims at bridging the gap between executable speciications and formal veriication. In this paper we combine two levels of description without changing the framework. The operational level of Maude/rewriting logic and the property-oriented level of temporal logics are combined. The combination is done by an embedding. We propose a(More)
We present the cognitive radio (policy) language (CoRaL), a new language for expressing policies that govern the behavior of cognitive radios that opportunistically share spectrum. A Policy Reasoner validates radio transmissions to ensure that they are compliant with the spectrum policies. The Policy Reasoner also discovers spectrum sharing opportunities by(More)
— Secure communication generally begins with a connection establishment phase in which messages are exchanged by client and server protocol software to generate, share, and use secret data or keys. This message exchange is referred to as an authentication or key distribution cryptographic protocol. CAPSL is a formal language for specifying cryptographic(More)