Sciweavers

1121 search results - page 43 / 225
» Logics of Complementarity in Information Systems
Sort
View
DSN
2009
IEEE
14 years 3 months ago
Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor
Dynamic Information Flow Tracking (DIFT) is a promising security technique. With hardware support, DIFT prevents a wide range of attacks on vulnerable software with minimal perfor...
Hari Kannan, Michael Dalton, Christos Kozyrakis
CSFW
2010
IEEE
14 years 22 days ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
ICSM
2009
IEEE
14 years 3 months ago
Predicting change impact from logical models
To improve the ability of predicting the impact scope of a given change, we present two approaches applicable to the maintenance of object-oriented software systems. Our first ap...
Sunny Wong, Yuanfang Cai
ICCS
2009
Springer
14 years 3 months ago
System Consequence
My paper discusses system consequence, which is a central idea in the project to lift the theory of information flow to the general level of universal logic and the theory of ins...
Robert E. Kent
EEMMAS
2007
Springer
14 years 3 months ago
Environment Support to the Management of Context Awareness Information
Abstract. Collaborative Ubiquitous Environments (CUEs) are environments supporting collaboration among persons in a ubiquitous computing setting. This paper shows how results of th...
Marco P. Locatelli, Giuseppe Vizzari