Sciweavers

739 search results - page 14 / 148
» Information Flow in Credential Systems
Sort
View
TISSEC
1998
58views more  TISSEC 1998»
13 years 7 months ago
Exception-Based Information Flow Control in Object-Oriented Systems
Elisa Bertino, Sabrina De Capitani di Vimercati, E...
MASCOTS
2008
13 years 9 months ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
SWS
2006
ACM
14 years 1 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch
WETICE
2003
IEEE
14 years 26 days ago
WebDAVA: An Administrator-Free Approach To Web File-Sharing
Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to deļ¬...
Alexander Levine, Vassilis Prevelakis, John Ioanni...
ICSE
2005
IEEE-ACM
14 years 7 months ago
An empirical evaluation of test case filtering techniques based on exercising complex information flows
Some software defects trigger failures only when certain complex information flows occur within the software. Profiling and analyzing such flows therefore provides a potentially i...
David Leon, Wes Masri, Andy Podgurski