Sciweavers

523 search results - page 11 / 105
» A Formal Account of WS-BPEL
Sort
View
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
14 years 8 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu
BPM
2009
Springer
119views Business» more  BPM 2009»
14 years 3 months ago
A Formal Model for Process Context Learning
Process models are considered to be a major asset in modern business organizations. They are expected to apply to all the possible business contexts in which the process may be exe...
Johny Ghattas, Pnina Soffer, Mor Peleg
CCS
2004
ACM
14 years 1 months ago
Formally verifying information flow type systems for concurrent and thread systems
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
Gilles Barthe, Leonor Prensa Nieto
CSUR
1999
137views more  CSUR 1999»
13 years 8 months ago
Algebraic Methods for Specification and Formal Development of Programs
with functions over those sets. This level of abstraction is commensurate with the view that the correctness of the input/output behaviour of a program takes precedence over all it...
Donald Sannella, Andrzej Tarlecki
CEAS
2006
Springer
14 years 5 days ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...