Sciweavers

2486 search results - page 78 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
CHI
2009
ACM
14 years 9 months ago
A mobile voice communication system in medical setting: love it or hate it?
Hospital work coordination and collaboration often requires mobility for acquiring proper information and resources. In turn, the spatial distribution and the mobility of clinicia...
Charlotte Tang, M. Sheelagh T. Carpendale
NSPW
2004
ACM
14 years 2 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
ISSAC
2009
Springer
149views Mathematics» more  ISSAC 2009»
14 years 3 months ago
Interoperating between computer algebra systems: computing homology of groups with kenzo and GAP
In this paper we report on an experience communicating two computer algebra systems, namely GAP (and more concretely, its HAP package to compute in Homological Algebra) and Kenzo ...
Ana Romero, Graham Ellis, Julio Rubio
SC
2009
ACM
14 years 3 months ago
Evaluating use of data flow systems for large graph analysis
Large graph analysis has become increasingly important and is widely used in many applications such as web mining, social network analysis, biology, and information retrieval. The...
Andy Yoo, Ian Kaplan
CSFW
1995
IEEE
14 years 10 days ago
Composing and decomposing systems under security properties
We investigate the formal relationship between separability of processes and the types of non-interference properties they enjoy. Though intuitively appealing, separability – th...
A. W. Roscoe, L. Wulf