Sciweavers

25 search results - page 3 / 5
» Managing Authorization Provenance: A Modal Logic Based Appro...
Sort
View
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 10 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
ENTCS
2008
90views more  ENTCS 2008»
13 years 8 months ago
Ensuring the Correctness of Lightweight Tactics for JavaCard Dynamic Logic
The interactive theorem prover developed in the KeY project, which implements a sequent calculus for JavaCard Dynamic Logic (JavaCardDL) is based on taclets. Taclets are lightweig...
Richard Bubel, Andreas Roth, Philipp Rümmer
CCS
2006
ACM
14 years 8 days ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
ISSTA
2004
ACM
14 years 1 months ago
An optimizing compiler for batches of temporal logic formulas
Model checking based on validating temporal logic formulas has proven practical and effective for numerous software engineering applications. As systems based on this approach ha...
James Ezick
JANCL
2002
121views more  JANCL 2002»
13 years 8 months ago
Approximate coherence-based reasoning
ABSTRACT. It has long been recognized that the concept of inconsistency is a central part of commonsense reasoning. In this issue, a number of authors have explored the idea of rea...
Frédéric Koriche