Sciweavers

2486 search results - page 135 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
CCS
2006
ACM
14 years 20 days ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
ICCV
2003
IEEE
14 years 11 months ago
Dynamic Stroke Information Analysis for Video-Based Handwritten Chinese Character Recognition
Video-based handwritten Character Recognition (VCR) system is a new type of character recognition system with many unique advantages over on-line character recognition system. Its...
Feng Lin, Xiaoou Tang
CADE
2008
Springer
14 years 9 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
DEBS
2007
ACM
14 years 26 days ago
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
Publish/subscribe systems provide an efficient, event-based, wide-area distributed communications infrastructure. Large scale publish/subscribe systems are likely to employ compon...
Lauri I. W. Pesonen, David M. Eyers, Jean Bacon
DISCEX
2003
IEEE
14 years 2 months ago
Monterey Security Enhanced Architecture Project
This research project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mech...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...