Sciweavers

10038 search results - page 22 / 2008
» Model Checking for Managers
Sort
View
CCS
2008
ACM
13 years 10 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ACISICIS
2010
IEEE
13 years 10 months ago
Modeling Software Project Monitoring with Stakeholders
Recently, software size becomes larger, and consequently, not only a software developer but also a software purchaser suffers considerable losses by software project failure. So av...
Masateru Tsunoda, Tomoko Matsumura, Ken-ichi Matsu...
EUROSYS
2008
ACM
14 years 5 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
CCS
2006
ACM
14 years 10 days ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
ASPDAC
2006
ACM
113views Hardware» more  ASPDAC 2006»
14 years 2 months ago
Transition-based coverage estimation for symbolic model checking
— Lack of complete formal specification is one of the major obstacles for the deployment of model checking. Coverage estimation addresses this issue by revealing the unverified...
Xingwen Xu, Shinji Kimura, Kazunari Horikawa, Take...