Radboud University Nijmegen

Displaying 1-18 of 18 results

  • White Papers // Apr 2011

    Implementing a Non-Strict Purely Functional Language in JavaScript

    This paper describes an implementation of a non-strict purely functional language in JavaScript. This particular implementation is based on the translation of a high-level functional language such as Haskell or Clean into JavaScript via the intermediate functional language Sapl. The resulting code relies on the use of an evaluator function...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2011

    The Identity Crisis Security, Privacy and Usability Issues in Identity Management

    This paper studies the current 'Identity crisis' caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single, comprehensive study and proposes recommendations to...

    Provided By Radboud University Nijmegen

  • White Papers // Nov 2010

    Short Paper: Privacy-Preserving ECC-Based Grouping Proofs for RFID

    The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags are potentially un-trusted. This paper extends this concept and proposes a narrow-strong privacy-preserving RFID grouping proof and demonstrates that it...

    Provided By Radboud University Nijmegen

  • White Papers // Sep 2010

    Testing With Functional Reference Implementations

    This paper discusses the authors' approach to test programs that determine which candidates are elected in the Scottish Single Transferable Vote (STV) elections. Due to the lack of properties suited for model-based testing, the authors have implemented a reference implementation in a pure functional programming language. Their tests revealed issues...

    Provided By Radboud University Nijmegen

  • White Papers // Jun 2010

    Dismantling SecureMemory, CryptoMemory and CryptoRF

    This paper addresses the (in)security of the cryptographic mechanisms used in the Atmel product families SecureMemory, CryptoMemory, and CryptoRF. These products are integrated circuits, consisting essentially of a small piece of memory and have cryptographic capabilities to authenticate and encrypt. They have two main application areas: in smart cards (ID...

    Provided By Radboud University Nijmegen

  • White Papers // May 2010

    Towards Dynamic Workflow Support for Crisis Management

    Current process support technology for crisis management is often limited to either sharing of information or hard-coded process support through dedicated systems. Workflow management systems have the potential to improve crisis response operations by automating coordination aspects. Unfortunately most contemporary systems can only support static workflows, hence yielding inflexible support...

    Provided By Radboud University Nijmegen

  • White Papers // Mar 2010

    Embedding a Web-Based Workflow Management System in a Functional Language

    Workflow management systems guide and monitor tasks performed by humans and computers. The workflow specifications are usually expressed in special purpose (graphical) formalisms. These formalisms impose severe restrictions on what can be expressed. Modern workflow management systems should handle intricate data dependencies, offer a web-based interface, and should adapt to...

    Provided By Radboud University Nijmegen

  • White Papers // Feb 2010

    iTasks 2: iTasks for End-Users

    WorkFlow Management Systems (WFMSs) are systems that generate, coordinate and monitor tasks performed by human workers in collaboration with automated (information) systems. The iTask system (iTasks) is a WFMS that uses a combinator language embedded in the pure and lazy functional language Clean for the specification of highly dynamic workflows....

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2010

    A Typical Synergy: Dynamic Types and Generalised Algebraic Datatypes

    The authors present a typical synergy between dynamic types (dynamics) and Generalised Algebraic DataTypes (GADTs). The former provides a clean approach to integrating dynamic typing in a statically typed language. It allows values to be wrapped together with their type in a uniform package, deferring type unification until run time...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2010

    Synthesis of Functions Using Generic Programming

    In this paper, the authors have shown a very general and flexible approach to do inductive programming by a generate and test approach. The user defines the syntax of the functions to be generated by a set of algebraic data types. Using generic programming support the user defines the semantic...

    Provided By Radboud University Nijmegen

  • White Papers // Nov 2009

    Full Memory Read Attack on a Java Card

    The authors present a simple attack on a Java Card smart card to perform arbitrary memory reads. The attack utilises a known technique of type confusion of the card's Java Virtual Machine by exploiting the faulty transaction mechanism implementation. The type confusion attack lets them access the application's private meta-data,...

    Provided By Radboud University Nijmegen

  • White Papers // May 2009

    Trade In A World With Recyclable Resources

    This paper examines the welfare-impact of trade from the premise that resources are limited and all goods in the long run consist of recyclable resources. It argues that export (import) of finished goods implies export (import) of the resources of which these goods exist. Trade affects the resource endowments and...

    Provided By Radboud University Nijmegen

  • White Papers // May 2009

    Applying Bayesian Networks for Intelligent Adaptable Printing Systems

    Bayesian networks are around more than twenty years by now. During the past decade they became quite popular in the scientific community. Researchers from application areas like psychology, biomedicine and finance have applied these techniques successfully. In the area of control engineering however, little progress has been made in the...

    Provided By Radboud University Nijmegen

  • White Papers // May 2009

    An Executable and Testable Semantics for iTasks

    The iTask system is an easy to use combinator library for specifying dynamic data dependent workflows in a very flexible way. The specified workflows are executed as a multi-user web-application. The implementation of the iTask system is fairly complicated. Hence the authors cannot use it for reasoning about the semantics...

    Provided By Radboud University Nijmegen

  • White Papers // Apr 2009

    Between Types and Tables: Using Generic Programming for Automated Mapping Between Data Types and Relational Databases

    In today's digital society, information systems play an important role in many organizations. While their construction is a well understood software engineering process, it still requires much engineering effort. The de facto storage mechanism in information systems is the relational database. Although the representation of data in these databases is...

    Provided By Radboud University Nijmegen

  • White Papers // Mar 2009

    iEditors: Extending iTask With Interactive Plug-Ins

    The iTask library of Clean enables the user to specify web-enabled workflow systems on a high level of abstraction. Details like client-server communication, storage and retrieval of state information, HTML generation, and web form handling are all handled automatically. Using only standard HTML web browser elements also has a disadvantage:...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2009

    Institutions And The Relation Between Corruption And Economic Growth

    The authors study the effects of corruption on economic growth in a framework that includes corruption as part of the institutional setting of countries. Using a formal growth framework where corruption affects labor inputs and the provision of public goods, they find that particularly in situations where institutions are not...

    Provided By Radboud University Nijmegen

  • White Papers // Dec 2008

    Designing Gendered Games Values Of Designers And Users Of Gendered Toys

    In a small-scale study the authors have analyzed the gender scripts of the toys of three Dutch toy producing companies and the authors have interviewed owners and directors of these companies. The authors found large differences in the 'Genderedness' of the games they were producing. The authors have found explanations...

    Provided By Radboud University Nijmegen

  • White Papers // Dec 2008

    Designing Gendered Games Values Of Designers And Users Of Gendered Toys

    In a small-scale study the authors have analyzed the gender scripts of the toys of three Dutch toy producing companies and the authors have interviewed owners and directors of these companies. The authors found large differences in the 'Genderedness' of the games they were producing. The authors have found explanations...

    Provided By Radboud University Nijmegen

  • White Papers // Nov 2010

    Short Paper: Privacy-Preserving ECC-Based Grouping Proofs for RFID

    The concept of grouping proofs has been introduced by Juels to permit RFID tags to generate a verifiable proof that they have been scanned simultaneously, even when readers or tags are potentially un-trusted. This paper extends this concept and proposes a narrow-strong privacy-preserving RFID grouping proof and demonstrates that it...

    Provided By Radboud University Nijmegen

  • White Papers // Jun 2010

    Dismantling SecureMemory, CryptoMemory and CryptoRF

    This paper addresses the (in)security of the cryptographic mechanisms used in the Atmel product families SecureMemory, CryptoMemory, and CryptoRF. These products are integrated circuits, consisting essentially of a small piece of memory and have cryptographic capabilities to authenticate and encrypt. They have two main application areas: in smart cards (ID...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2009

    Institutions And The Relation Between Corruption And Economic Growth

    The authors study the effects of corruption on economic growth in a framework that includes corruption as part of the institutional setting of countries. Using a formal growth framework where corruption affects labor inputs and the provision of public goods, they find that particularly in situations where institutions are not...

    Provided By Radboud University Nijmegen

  • White Papers // May 2009

    Trade In A World With Recyclable Resources

    This paper examines the welfare-impact of trade from the premise that resources are limited and all goods in the long run consist of recyclable resources. It argues that export (import) of finished goods implies export (import) of the resources of which these goods exist. Trade affects the resource endowments and...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2011

    The Identity Crisis Security, Privacy and Usability Issues in Identity Management

    This paper studies the current 'Identity crisis' caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single, comprehensive study and proposes recommendations to...

    Provided By Radboud University Nijmegen

  • White Papers // Apr 2011

    Implementing a Non-Strict Purely Functional Language in JavaScript

    This paper describes an implementation of a non-strict purely functional language in JavaScript. This particular implementation is based on the translation of a high-level functional language such as Haskell or Clean into JavaScript via the intermediate functional language Sapl. The resulting code relies on the use of an evaluator function...

    Provided By Radboud University Nijmegen

  • White Papers // Mar 2010

    Embedding a Web-Based Workflow Management System in a Functional Language

    Workflow management systems guide and monitor tasks performed by humans and computers. The workflow specifications are usually expressed in special purpose (graphical) formalisms. These formalisms impose severe restrictions on what can be expressed. Modern workflow management systems should handle intricate data dependencies, offer a web-based interface, and should adapt to...

    Provided By Radboud University Nijmegen

  • White Papers // May 2010

    Towards Dynamic Workflow Support for Crisis Management

    Current process support technology for crisis management is often limited to either sharing of information or hard-coded process support through dedicated systems. Workflow management systems have the potential to improve crisis response operations by automating coordination aspects. Unfortunately most contemporary systems can only support static workflows, hence yielding inflexible support...

    Provided By Radboud University Nijmegen

  • White Papers // Sep 2010

    Testing With Functional Reference Implementations

    This paper discusses the authors' approach to test programs that determine which candidates are elected in the Scottish Single Transferable Vote (STV) elections. Due to the lack of properties suited for model-based testing, the authors have implemented a reference implementation in a pure functional programming language. Their tests revealed issues...

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2010

    Synthesis of Functions Using Generic Programming

    In this paper, the authors have shown a very general and flexible approach to do inductive programming by a generate and test approach. The user defines the syntax of the functions to be generated by a set of algebraic data types. Using generic programming support the user defines the semantic...

    Provided By Radboud University Nijmegen

  • White Papers // Feb 2010

    iTasks 2: iTasks for End-Users

    WorkFlow Management Systems (WFMSs) are systems that generate, coordinate and monitor tasks performed by human workers in collaboration with automated (information) systems. The iTask system (iTasks) is a WFMS that uses a combinator language embedded in the pure and lazy functional language Clean for the specification of highly dynamic workflows....

    Provided By Radboud University Nijmegen

  • White Papers // Jan 2010

    A Typical Synergy: Dynamic Types and Generalised Algebraic Datatypes

    The authors present a typical synergy between dynamic types (dynamics) and Generalised Algebraic DataTypes (GADTs). The former provides a clean approach to integrating dynamic typing in a statically typed language. It allows values to be wrapped together with their type in a uniform package, deferring type unification until run time...

    Provided By Radboud University Nijmegen

  • White Papers // May 2009

    Applying Bayesian Networks for Intelligent Adaptable Printing Systems

    Bayesian networks are around more than twenty years by now. During the past decade they became quite popular in the scientific community. Researchers from application areas like psychology, biomedicine and finance have applied these techniques successfully. In the area of control engineering however, little progress has been made in the...

    Provided By Radboud University Nijmegen

  • White Papers // Mar 2009

    iEditors: Extending iTask With Interactive Plug-Ins

    The iTask library of Clean enables the user to specify web-enabled workflow systems on a high level of abstraction. Details like client-server communication, storage and retrieval of state information, HTML generation, and web form handling are all handled automatically. Using only standard HTML web browser elements also has a disadvantage:...

    Provided By Radboud University Nijmegen

  • White Papers // May 2009

    An Executable and Testable Semantics for iTasks

    The iTask system is an easy to use combinator library for specifying dynamic data dependent workflows in a very flexible way. The specified workflows are executed as a multi-user web-application. The implementation of the iTask system is fairly complicated. Hence the authors cannot use it for reasoning about the semantics...

    Provided By Radboud University Nijmegen

  • White Papers // Apr 2009

    Between Types and Tables: Using Generic Programming for Automated Mapping Between Data Types and Relational Databases

    In today's digital society, information systems play an important role in many organizations. While their construction is a well understood software engineering process, it still requires much engineering effort. The de facto storage mechanism in information systems is the relational database. Although the representation of data in these databases is...

    Provided By Radboud University Nijmegen

  • White Papers // Nov 2009

    Full Memory Read Attack on a Java Card

    The authors present a simple attack on a Java Card smart card to perform arbitrary memory reads. The attack utilises a known technique of type confusion of the card's Java Virtual Machine by exploiting the faulty transaction mechanism implementation. The type confusion attack lets them access the application's private meta-data,...

    Provided By Radboud University Nijmegen