Sciweavers

429 search results - page 60 / 86
» Compositionality of Secure Information Flow
Sort
View
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 9 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
TCS
2008
13 years 8 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
ICCS
2001
Springer
14 years 14 days ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
BPM
2007
Springer
118views Business» more  BPM 2007»
14 years 2 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
CAISE
2003
Springer
13 years 11 months ago
A Specification Approach to Compose Mobile Web Services Using Service Chart Diagrams
We present our work on composing mobile Web services, denoted by M-services, in the wireless world. The wireless world has its own features that make it completely different from t...
Zakaria Maamar, Mohammed Lahkim