Sciweavers

2705 search results - page 368 / 541
» Formal Ontology for Subject
Sort
View
IDTRUST
2010
ACM
14 years 5 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
SAC
2010
ACM
14 years 5 months ago
A real-time architecture design language for multi-rate embedded control systems
This paper presents a language dedicated to the description of the software architecture of complex embedded control systems. The language relies on the synchronous approach but e...
Julien Forget, Frédéric Boniol, Davi...
CCS
2010
ACM
14 years 5 months ago
A lattice-based approach to mashup security
A web mashup is a web application that integrates content from different providers to create a new service, not offered by the content providers. As mashups grow in popularity, ...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
CCS
2010
ACM
14 years 5 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
EDBT
2010
ACM
127views Database» more  EDBT 2010»
14 years 5 months ago
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Relational databases are periodically vacuumed to remove tuples that have expired. During the discovery phase of litigation, plaintiffs ask defendants for access to information re...
Ragib Hasan, Marianne Winslett