Sciweavers

872 search results - page 57 / 175
» An Access Control Language for a General Provenance Model
Sort
View
ACSAC
2002
IEEE
14 years 24 days ago
A Context-Aware Security Architecture for Emerging Applications
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
CCS
2008
ACM
13 years 9 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
HIPS
1998
IEEE
14 years 2 days ago
Language Bindings for a Data-Parallel Runtime
The NPAC kernel runtime, developed in the PCRC Parallel Compiler Runtime Consortium project, is a runtime library with special support for the High Performance Fortran data model....
Bryan Carpenter, Geoffrey Fox, Donald Leskiw, Xiao...
CIE
2007
Springer
14 years 2 months ago
Characterizing Programming Systems Allowing Program Self-reference
The interest is in characterizing insightfully the power of program self-reference in effective programming systems (epses), the computability-theoretic analogs of programming lan...
John Case, Samuel E. Moelius
PLDI
2006
ACM
14 years 1 months ago
LOCKSMITH: context-sensitive correlation analysis for race detection
One common technique for preventing data races in multi-threaded programs is to ensure that all accesses to shared locations are consistently protected by a lock. We present a too...
Polyvios Pratikakis, Jeffrey S. Foster, Michael W....