Sciweavers

739 search results - page 118 / 148
» Information Flow in Credential Systems
Sort
View
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
ICFP
2004
ACM
14 years 7 months ago
Translating dependency into parametricity
Abadi et al. introduced the dependency core calculus (DCC) as a unifying framework to study many important program analyses such as binding time, information flow, slicing, and fu...
Stephen Tse, Steve Zdancewic
MABS
2004
Springer
14 years 1 months ago
Layering Social Interaction Scenarios on Environmental Simulation
For an integrated simulation such as the natural environment affected by human society, it is indispensable to provide an integrated simulator that incorporates multiple computatio...
Daisuke Torii, Toru Ishida, Stéphane Bonnea...
WMCSA
2003
IEEE
14 years 28 days ago
River: An Infrastructure for Context Dependent, Reactive Communication Primitives
Applications and services in ubiquitous computing systems often interact in a context-dependent, reactive manner. How information flows, and what services communicate when, is det...
Jong Hee Kang, Matthai Philipose, Gaetano Borriell...
MM
2003
ACM
161views Multimedia» more  MM 2003»
14 years 27 days ago
MuSA.RT: music on the spiral array. real-time
We present MuSA.RT, Opus 1, a multimodal interactive system for music analysis and visualization using the Spiral Array model. Real-time MIDI input from a live performance is proc...
Elaine Chew, Alexandre R. J. François