Sciweavers

852 search results - page 121 / 171
» Model-Checking Access Control Policies
Sort
View
PERVASIVE
2007
Springer
14 years 3 months ago
Virtual Walls: Protecting Digital Privacy in Pervasive Environments
As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ cont...
Apu Kapadia, Tristan Henderson, Jeffrey J. Fieldin...
ACSAC
2007
IEEE
14 years 3 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
SAC
2000
ACM
14 years 1 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...
MODELLIERUNG
2008
13 years 10 months ago
Modelling Security Goals in Business Processes
: Various types of security goals, such as authentication or confidentiality, can be defined as policies for process-aware information systems, typically in a manual fashion. There...
Christian Wolter, Michael Menzel, Christoph Meinel
IADIS
2004
13 years 10 months ago
Constructing digital libraries with quality
Digital Libraries can be considered islands of specialized collections on the Web, which have their own management policy to control publishing and access, offering an environment...
Ewerton M. Salvador, José Jorge L. D. Jr., ...