Sciweavers

142 search results - page 11 / 29
» Information Flow Control and Applications - Bridging a Gap
Sort
View
IEEEIAS
2008
IEEE
14 years 2 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
ICC
2009
IEEE
121views Communications» more  ICC 2009»
13 years 5 months ago
Trust-Based Data Disclosure in Sensor Networks
In sensor networks, privacy can be addressed in different levels of the network stack and at different points of the information flow. This paper presents an application level sche...
Efthimia Aivaloglou, Stefanos Gritzalis
IPPS
1996
IEEE
13 years 12 months ago
A Memory Controller for Improved Performance of Streamed Computations on Symmetric Multiprocessors
The growing disparity between processor and memory speeds has caused memory bandwidth to become the performance bottleneck for many applications. In particular, this performance g...
Sally A. McKee, William A. Wulf
ESIAT
2009
IEEE
13 years 5 months ago
Research and Realization of Geospatial Information Service Orchestration Based on BPEL
Geospatial information services composition is a promising approach to construct complex Web GIS applications. BPEL, which is the language and the industry standard that expresses ...
Xiaoliang Meng, Fuling Bian, Yichun Xie
DEON
2008
Springer
13 years 9 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...