Sciweavers

309 search results - page 46 / 62
» A Type System for Expressive Security Policies
Sort
View
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
14 years 7 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
OOPSLA
2010
Springer
13 years 6 months ago
Tribal ownership
Tribal Ownership unifies class nesting and object ownership. Tribal Ownership is based on Tribe, a language with nested classes and object families. In Tribal Ownership, a progra...
Nicholas R. Cameron, James Noble, Tobias Wrigstad
TCS
2008
13 years 7 months ago
Role-based access control for boxed ambients
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acad...
Adriana B. Compagnoni, Elsa L. Gunter, Philippe Bi...
PODS
2006
ACM
116views Database» more  PODS 2006»
14 years 7 months ago
Relational lenses: a language for updatable views
We propose a novel approach to the classical view update problem. The view update problem arises from the fact that modifications to a database view may not correspond uniquely to...
Aaron Bohannon, Benjamin C. Pierce, Jeffrey A. Vau...
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
13 years 11 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...