Sciweavers

366 search results - page 26 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
CCS
2004
ACM
14 years 2 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
SEBD
1997
158views Database» more  SEBD 1997»
13 years 10 months ago
Indexing Metric Spaces with M-Tree
M-tree is a dynamic access method suitable to index generic “metric spaces”, where the function used to compute the distance between any two objects satisfies the positivity, ...
Paolo Ciaccia, Marco Patella, Fausto Rabitti, Pave...
FMCO
2007
Springer
124views Formal Methods» more  FMCO 2007»
14 years 18 days ago
Certification Using the Mobius Base Logic
This paper describes a core component of Mobius' Trusted Code Base, the Mobius base logic. This program logic facilitates the transmission of certificates that are generated u...
Lennart Beringer, Martin Hofmann, Mariela Pavlova
RE
2008
Springer
13 years 8 months ago
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility
U.S. laws and regulations are designed to support broad societal goals, such as accessibility, privacy and safety. To demonstrate that a product complies with these goals, busines...
Travis D. Breaux, Annie I. Antón, Kent Bouc...
STORAGESS
2005
ACM
14 years 2 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...