Sciweavers

565 search results - page 37 / 113
» A logic for authorization provenance
Sort
View
TAP
2010
Springer
134views Hardware» more  TAP 2010»
13 years 5 months ago
Testing First-Order Logic Axioms in Program Verification
Program verification systems based on automated theorem provers rely on user-provided axioms in order to verify domain-specific properties of code. However, formulating axioms corr...
Ki Yung Ahn, Ewen Denney
TCS
2011
13 years 2 months ago
A semantic measure of the execution time in linear logic
We give a semantic account of the execution time (i.e. the number of cut elimination steps leading to the normal form) of an untyped MELL net. We first prove that: 1) a net is he...
Daniel de Carvalho, Michele Pagani, Lorenzo Tortor...
CHI
2008
ACM
14 years 8 months ago
SuperBreak: using interactivity to enhance ergonomic typing breaks
Repetitive strain injuries and ergonomics concerns have become increasingly significant health issues as a growing number of individuals frequently use computers for long periods ...
Dan Morris, A. J. Bernheim Brush, Brian Meyers
ESORICS
2006
Springer
13 years 11 months ago
Reducing the Dependence of SPKI/SDSI on PKI
Abstract. Trust-management systems address the authorization problem in distributed systems. They offer several advantages over other approaches, such as support for delegation and...
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwo...
CHI
2011
ACM
12 years 11 months ago
Social media ownership: using twitter as a window onto current attitudes and beliefs
Social media, by its very nature, introduces questions about ownership. Ownership comes into play most crucially when we investigate how social media is saved or archived; how it ...
Catherine C. Marshall, Frank M. Shipman III