Sciweavers

17789 search results - page 36 / 3558
» Exceptional Use Cases
Sort
View
RTA
2005
Springer
14 years 1 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
PLDI
2009
ACM
14 years 2 months ago
Catch me if you can: permissive yet secure error handling
Program errors are a source of information leaks. Tracking these leaks is hard because error propagation breaks out of program structure. Programming languages often feature excep...
Aslan Askarov, Andrei Sabelfeld
ACSAC
2006
IEEE
14 years 1 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg
EACL
1993
ACL Anthology
13 years 9 months ago
Two-level Description of Turkish Morphology
: This paper describes a full two-level morphological description 5,9 of Turkish word structures. The description has been implemented using the PC-KIMMO environment 2 and is based...
Kemal Oflazer
TIFS
2010
144views more  TIFS 2010»
13 years 6 months ago
Forensic detection of image manipulation using statistical intrinsic fingerprints
—As the use of digital images has increased, so has the means and the incentive to create digital image forgeries. Accordingly, there is a great need for digital image forensic t...
Matthew C. Stamm, K. J. Ray Liu