Sciweavers

979 search results - page 60 / 196
» Developing Dynamic Security Policies
Sort
View
ROBOCUP
2004
Springer
121views Robotics» more  ROBOCUP 2004»
14 years 3 months ago
Exploring Auction Mechanisms for Role Assignment in Teams of Autonomous Robots
We are exploring the use of auction mechanisms to assign roles within a team of agents operating in a dynamic environment. Depending on the degree of collaboration between the agen...
Vanessa Frías-Martínez, Elizabeth Sk...
VLDB
1998
ACM
134views Database» more  VLDB 1998»
14 years 2 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
ASM
2010
ASM
14 years 4 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...
TCS
2010
13 years 8 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
CSFW
2006
IEEE
14 years 4 months ago
Securing Interaction between Threads and the Scheduler
The problem of information flow in multithreaded programs remains an important open challenge. Existing approaches to specifying and enforcing information-flow security often su...
Alejandro Russo, Andrei Sabelfeld