Sciweavers

739 search results - page 118 / 148
» A security framework for the analysis and design of software...
Sort
View
RTAS
2008
IEEE
14 years 1 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...
JECR
2000
167views more  JECR 2000»
13 years 7 months ago
Commercial Scenarios of Digital Agent Deployment: A Functional Classification
The evolution and commercialization of Web Information Systems (WIS) since 1991 has gradually shifted the focus from basic design issues to feedback analysis, visualization techni...
Arno Scharl, Christian Bauer, Marion Kaukal
ESORICS
2009
Springer
14 years 8 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
SIGMOD
2007
ACM
144views Database» more  SIGMOD 2007»
14 years 7 months ago
GhostDB: querying visible and hidden data without leaks
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Phil...
PLDI
2010
ACM
14 years 19 days ago
Decoupled lifeguards: enabling path optimizations for dynamic correctness checking tools
Dynamic correctness checking tools (a.k.a. lifeguards) can detect a wide array of correctness issues, such as memory, security, and concurrency misbehavior, in unmodified executa...
Olatunji Ruwase, Shimin Chen, Phillip B. Gibbons, ...