Sciweavers

293 search results - page 27 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
ACSAC
2000
IEEE
14 years 1 days ago
Policy Mediation for Multi-Enterprise Environments
Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access...
Pablo Galiasso, Oliver Bremer, John Hale, Sujeet S...
ACSAC
2006
IEEE
14 years 1 months ago
Engineering Sufficiently Secure Computing
We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal v...
Brian Witten
ESEC
1999
Springer
13 years 12 months ago
The CIP Method: Component- and Model-Based Construction of Embedded Systems
CIP is a model-based software development method for embedded systems. The problem of constructing an embedded system is decomposed into a functional and a connection problem. The ...
Hugo Fierz
COLT
2008
Springer
13 years 9 months ago
Linear Algorithms for Online Multitask Classification
We design and analyze interacting online algorithms for multitask classification that perform better than independent learners whenever the tasks are related in a certain sense. W...
Giovanni Cavallanti, Nicolò Cesa-Bianchi, C...
KI
2007
Springer
14 years 1 months ago
Relational Exploration - Reconciling Plato and Aristotle
Abstract. We provide an interactive method for knowledge acquisition combining approaches from description logic and formal concept analysis. Based on present data, hypothetical ru...
Sebastian Rudolph