Sciweavers

1818 search results - page 173 / 364
» How users use access control
Sort
View
PLDI
2005
ACM
14 years 3 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
CCS
2008
ACM
13 years 11 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
SACMAT
2010
ACM
14 years 2 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
INTERACT
2003
13 years 11 months ago
The Pragmatic Web: Agent-Based Multimodal Web Interaction with no Browser in Sight
: To a large degree information has become accessible – anytime, anywhere – but not necessarily useful. Unless the right information is presented at the right time, in the righ...
Alexander Repenning, James Sullivan
MSWIM
2006
ACM
14 years 3 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt