Sciweavers

2486 search results - page 94 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
STORAGESS
2005
ACM
14 years 2 months ago
Pvault: a client server system providing mobile access to personal data
In this paper we describe the design for the Pvault software, which is a personal data manager that stores and retrieves data from a remote untrusted data server securely. The maj...
Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalin...

Book
290views
15 years 7 months ago
Type Theory and Functional Programming
"Constructive Type theory has been a topic of research interest to computer scientists, mathematicians, logicians and philosophers for a number of years. For computer scient...
Simon Thompson
ESORICS
2008
Springer
13 years 10 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
ICSM
2002
IEEE
14 years 1 months ago
The Information Gathering Strategies of Software Maintainers
In examining software maintenance processes for improvement opportunities, an obvious choice is information flow. Obtaining accurate, up-to-date, and useful information about a sy...
Carolyn B. Seaman