Sciweavers

1121 search results - page 68 / 225
» Logics of Complementarity in Information Systems
Sort
View
CCS
2010
ACM
14 years 3 months ago
Effective trust management through a hybrid logical and relational approach
Despite a plethora of recent research regarding trust management approaches to authorization, relatively little attention has been given to exactly how these technologies can be e...
Adam J. Lee, Ting Yu, Yann Le Gall
MMMACNS
2001
Springer
14 years 1 months ago
Analyzing Separation of Duties in Petri Net Workflows
Abstract. With the rise of global networks like the Internet the importance of workflow systems is growing. However, security questions in such environments often only address secu...
Konstantin Knorr, Harald Weidner
TISSEC
2010
142views more  TISSEC 2010»
13 years 3 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
RV
2010
Springer
220views Hardware» more  RV 2010»
13 years 6 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu
ICDAR
2003
IEEE
14 years 2 months ago
Graph Grammar Based Analysis System of Complex Table Form Document
Structure analysis of table form document is important because printed documents and also electronical documents only provide geometrical layout and lexical information explicitly...
Akira Amano, Naoki Asada