Sciweavers

798 search results - page 81 / 160
» Comparing the expressive power of access control models
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 6 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
OSDI
2008
ACM
14 years 9 months ago
Delivering Energy Proportionality with Non Energy-Proportional Systems - Optimizing the Ensemble
: ? Delivering Energy Proportionality with Non Energy-Proportional Systems-Optimizing the Ensemble Niraj Tolia, Zhikui Wang, Manish Marwah, Cullen Bash, Parthasarathy Ranganathan, ...
Niraj Tolia, Zhikui Wang, Manish Marwah, Cullen Ba...
IPPS
2003
IEEE
14 years 2 months ago
Performance of Distributed Algorithms for Topology Control in Wireless Networks
We try to close the gap between theoretical investigations of wireless network topologies and realistic wireless environments. For point-to-point communication, we examine theoret...
Stefan Rührup, Christian Schindelhauer, Klaus...
SPIN
2000
Springer
14 years 17 days ago
Verification and Optimization of a PLC Control Schedule
Abstract. We report on the use of model checking techniques for both the verification of a process control program and the derivation of optimal control schedules. Most of this wor...
Ed Brinksma, Angelika Mader
RECOMB
2004
Springer
14 years 9 months ago
Learning Regulatory Network Models that Represent Regulator States and Roles
Abstract. We present an approach to inferring probabilistic models of generegulatory networks that is intended to provide a more mechanistic representation of transcriptional regul...
Keith Noto, Mark Craven