Sciweavers

689 search results - page 90 / 138
» Encapsulation theory fundamentals
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
FSKD
2007
Springer
140views Fuzzy Logic» more  FSKD 2007»
14 years 4 months ago
QoS-Aware Web Service Selection by a Synthetic Weight
The selection of web services according to different quality of service (QoS) is one of the most important decision issues for which complex considerations are involved. In many c...
PengCheng Xiong, Yushun Fan
GECCO
2007
Springer
190views Optimization» more  GECCO 2007»
14 years 4 months ago
Analysis of evolutionary algorithms for the longest common subsequence problem
In the longest common subsequence problem the task is to find the longest sequence of letters that can be found as subsequence in all members of a given finite set of sequences....
Thomas Jansen, Dennis Weyland
IFM
2007
Springer
245views Formal Methods» more  IFM 2007»
14 years 4 months ago
Co-simulation of Distributed Embedded Real-Time Control Systems
Development of computerized embedded control systems is difficult because it brings together systems theory, electrical engineering and computer science. The engineering and analys...
Marcel Verhoef, Peter Visser, Jozef Hooman, Jan F....
PROVSEC
2007
Springer
14 years 4 months ago
Formal Proof of Provable Security by Game-Playing in a Proof Assistant
Game-playing is an approach to write security proofs that are easy to verify. In this approach, security definitions and intractable problems are written as programs called games ...
Reynald Affeldt, Miki Tanaka, Nicolas Marti