Sciweavers

239 search results - page 31 / 48
» Accountable Privacy
Sort
View
CCS
2004
ACM
14 years 4 months ago
Formally verifying information flow type systems for concurrent and thread systems
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
Gilles Barthe, Leonor Prensa Nieto
XMLSEC
2003
ACM
14 years 4 months ago
A bitmap-based access control for restricted views of XML documents
The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An o...
Abhilash Gummadi, Jong P. Yoon, Biren Shah, Vijay ...
ACSAC
2002
IEEE
14 years 3 months ago
Representing TCP/IP Connectivity For Topological Analysis of Network Security
The individual vulnerabilities of hosts on a network can be combined by an attacker to gain access that would not be possible if the hosts were not interconnected. Currently avail...
Ronald W. Ritchey, Brian O'Berry, Steven Noel
OOPSLA
2001
Springer
14 years 3 months ago
Portable Resource Control in Java: The J-SEAL2 Approach
Preventing abusive resource consumption is indispensable for all kinds of systems that execute untrusted mobile code, such as mobile object systems, extensible web servers, and we...
Walter Binder, Jarle Hulaas, Alex Villazón
SAFECOMP
1999
Springer
14 years 3 months ago
A Systematic Approach to Safety Case Maintenance
A crucial aspect of safety case management is the ongoing maintenance of the safety argument through life. Throughout the operational life of any system, the corresponding safety ...
Tim P. Kelly, John A. McDermid