Sciweavers

293 search results - page 5 / 59
» A Logical Approach to Multilevel Security of Probabilistic S...
Sort
View
SP
1999
IEEE
125views Security Privacy» more  SP 1999»
14 years 3 days ago
A Multi-Threading Architecture for Multilevel Secure Transaction Processing
A TCB and security kernel architecture for supporting multi-threaded, queue-driven transaction processing applications in a multilevel secure environment is presented. Our design ...
Haruna R. Isa, William R. Shockley, Cynthia E. Irv...
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 11 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
ICCD
1994
IEEE
142views Hardware» more  ICCD 1994»
13 years 12 months ago
Grammar-Based Optimization of Synthesis Scenarios
Systems for multi-level logic optimization are usually based on a set of specialized, loosely-related transformations which work on a network representation. The sequence of trans...
Andreas Kuehlmann, Lukas P. P. P. van Ginneken
FLAIRS
2008
13 years 10 months ago
A New Approach to Model-Based Diagnosis Using Probabilistic Logic
We describe a new approach to model construction using transfer function diagrams that are consequently mapped into generalized loopy logic, a first-order, Turing-complete stochas...
Nikita A. Sakhanenko, Roshan Rammohan, George F. L...
CCS
2006
ACM
13 years 11 months ago
Secure information flow with random assignment and encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables classified as H to variables classified as L. In this work we extend such...
Geoffrey Smith