Sciweavers

739 search results - page 78 / 148
» Information Flow in Credential Systems
Sort
View
POPL
2006
ACM
14 years 8 months ago
On flow-sensitive security types
This article investigates formal properties of a family of semantically sound flow-sensitive type systems for tracking information flow in simple While programs. The family is ind...
Sebastian Hunt, David Sands
DAGSTUHL
2006
13 years 9 months ago
Context Dependent Analysis of BioAmbients
BioAmbients is a derivative of mobile ambients that has shown promise of describing interesting features of the behaviour of biological systems. The technical contribution of this...
Henrik Pilegaard, Hanne Riis Nielson, Flemming Nie...
CSFW
1999
IEEE
14 years 3 days ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
CBMS
2001
IEEE
13 years 11 months ago
Bridging Two Biomedical Journal Databases with XML-A Case Study
For transferring data between heterogeneous databases, XML is becoming a method of choice. While deployment is generally successfully, there are barriers to overcome. A recent exa...
Glenn Pearson, Chan Moon
CORR
2008
Springer
169views Education» more  CORR 2008»
13 years 7 months ago
Congestion Reduction Using Ad hoc Message Dissemination in Vehicular Networks
Abstract-- Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITS) and locationaware services [1]. The ability to disseminate information ...
Thomas D. Hewer, Maziar Nekovee