Sciweavers

129 search results - page 2 / 26
» A Type System and Analysis for the Automatic Extraction and ...
Sort
View
DRM
2003
Springer
14 years 29 days ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
SIGADA
2004
Springer
14 years 1 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
ESOP
2008
Springer
13 years 9 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
TOPLAS
2010
115views more  TOPLAS 2010»
13 years 6 months ago
JavaCOP: Declarative pluggable types for java
program constraints are defined over a program’s abstract syntax tree. The JAVACOP compiler automatically enforces these constraints on programs during compilation. The JAVACOP ...
Shane Markstrum, Daniel Marino, Matthew Esquivel, ...
ICDAR
2003
IEEE
14 years 1 months ago
Font Type Extraction and Character Prototyping Using Gabor Filters
In this paper, we present an automatic method for character prototyping and font type characterization in machine-printed document images at a character level. To do so, we use a ...
Bénédicte Allier, Hubert Emptoz