Sciweavers

3717 search results - page 508 / 744
» Architecture-Based Design of Computer Based Systems
Sort
View
TCS
2010
13 years 9 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
ANCS
2010
ACM
13 years 8 months ago
NetEx: efficient and cost-effective internet bulk content delivery
The Internet is witnessing explosive growth in traffic due to bulk content transfers, such as multimedia and software downloads, and online sharing of personal, commercial, and sc...
Massimiliano Marcon, Nuno Santos, P. Krishna Gumma...
SACMAT
2004
ACM
14 years 4 months ago
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
SIGECOM
2004
ACM
77views ECommerce» more  SIGECOM 2004»
14 years 4 months ago
Stopping outgoing spam
We analyze the problem of preventing outgoing spam. We show that some conventional techniques for limiting outgoing spam are likely to be ineffective. We show that while imposing...
Joshua T. Goodman, Robert Rounthwaite
DALT
2006
Springer
14 years 2 months ago
Producing Compliant Interactions: Conformance, Coverage, and Interoperability
Agents in an open system interact with each other based on (typically, published) protocols. An agent may, however, deviate from the protocol because of its internal policies. Such...
Amit K. Chopra, Munindar P. Singh