Sciweavers

739 search results - page 59 / 148
» Information Flow in Credential Systems
Sort
View
ESORICS
2003
Springer
14 years 28 days ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
ACSAC
2007
IEEE
14 years 2 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
CHI
2003
ACM
14 years 8 months ago
Women go with the (optical) flow
Previous research reported interesting gender effects involving specific benefits for females navigating with wider fields of view on large displays. However, it was not clear wha...
Desney S. Tan, Mary Czerwinski, George G. Robertso...
DSOM
2000
Springer
14 years 2 days ago
Middleware Platform Management Based on Portable Interceptors
Abstract. Object middleware is an enabling technology for distributed applications that are required to operate in heterogeneous computing and communication environments. Although ...
Olaf Kath, Aart van Halteren, Frank Stoinski, Maar...
SLOGICA
2008
101views more  SLOGICA 2008»
13 years 7 months ago
A Dynamic-Logical Perspective on Quantum Behavior
In this paper we show how recent concepts from Dynamic Logic, and in particular from Dynamic Epistemic logic, can be used to model and interpret quantum behavior. Our main thesis ...
Alexandru Baltag, Sonja Smets