Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
In order to enrich XML with event driven, active behavior, the Active XML Schema approach defines active behavior within XML schemas along metadata, and stores traces of active b...
The lack of a standard formalism for expressing the semantics of an XML vocabulary is a major obstacle to the development of high-function interoperable digital libraries. XML doc...
Allen Renear, David Dubin, C. M. Sperberg-McQueen,...
We propose a high-level language based on rst order logic for expressing synchronization in concurrent object-oriented programs. The language allows the programmer to declaratively...