Sciweavers

516 search results - page 41 / 104
» Comparing Two Information Flow Security Properties
Sort
View
CHI
1992
ACM
14 years 28 days ago
Dynamic Queries for Information Exploration: An Implementation and Evaluation
We designed, implemented and evaluated a new concept for direct manipulation of databases, called dynamic queries, that allowsuserstoformulatequerieswithgraphicalwidgets,such as s...
Christopher Ahlberg, Christopher Williamson, Ben S...
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
14 years 3 months ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...
STORAGESS
2005
ACM
14 years 2 months ago
An approach for fault tolerant and secure data storage in collaborative work environments
We describe a novel approach for building a secure and fault tolerant data storage service in collaborative work environments, which uses perfect secret sharing schemes to store d...
Arun Subbiah, Douglas M. Blough
LICS
1999
IEEE
14 years 1 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
BROADNETS
2006
IEEE
14 years 17 days ago
Wavelength Assignment in Optical Networks with Imprecise Network State Information
Efficient routing and wavelength assignment (RWA) in wavelength-routed all-optical networks is critical for achieving high efficiency over the backbone links. Extensive research ha...
Satyajeet Ahuja, Marwan Krunz, Srinivasan Ramasubr...