Sciweavers

579 search results - page 98 / 116
» Policies, Models, and Languages for Access Control
Sort
View
TAP
2009
Springer
178views Hardware» more  TAP 2009»
14 years 2 months ago
Dynamic Symbolic Execution for Testing Distributed Objects
Abstract. This paper extends dynamic symbolic execution to distributed and concurrent systems. Dynamic symbolic execution can be used in software testing to systematically identify...
Andreas Griesmayer, Bernhard K. Aichernig, Einar B...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
VL
1992
IEEE
153views Visual Languages» more  VL 1992»
13 years 11 months ago
MAVIS: A Visual Environment for Active Computer Vision
MAVIS is a dataflow visual languagefor computer vision and image processing. It features a high degree of `liveness' and compliance with user directives, providing ajexible e...
Thomas J. Olson, Nicholas G. Klop, Mark R. Hyett, ...
TLDI
2003
ACM
14 years 24 days ago
The logical approach to stack typing
We develop a logic for reasoning about adjacency and separation of memory blocks, as well as aliasing of pointers. We provide a memory model for our logic and present a sound set ...
Amal J. Ahmed, David Walker
ICDCS
1996
IEEE
13 years 11 months ago
Hidden Software Capabilities
: Software capabilities are a very convenient means to protect co-operating applications. They allow access rights to be dynamically exchanged between mutually suspicious interacti...
Daniel Hagimont, Jacques Mossière, Xavier R...