Sciweavers

806 search results - page 114 / 162
» Privacy Policy Referencing
Sort
View
131
Voted
CRITIS
2007
15 years 5 months ago
Managing Critical Infrastructures through Virtual Network Communities
Abstract. Virtual Interacting Network CommunIty (Vinci) is an abstract architecture to share in a secure way an ICT infrastructure among several user communities, each with its own...
Fabrizio Baiardi, Gaspare Sala, Daniele Sgandurra
ESORICS
2010
Springer
15 years 4 months ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
116
Voted
ISI
2006
Springer
15 years 3 months ago
Towards Optimal Police Patrol Routes with Genetic Algorithms
It is quite consensual that police patrolling can be regarded as one of the best well-known practices for implementing public-safety preventive policies towards the combat of an as...
Danilo Reis, Adriano Melo, André L. V. Coel...
136
Voted
OOPSLA
2010
Springer
15 years 1 months ago
Tribal ownership
Tribal Ownership unifies class nesting and object ownership. Tribal Ownership is based on Tribe, a language with nested classes and object families. In Tribal Ownership, a progra...
Nicholas R. Cameron, James Noble, Tobias Wrigstad
CSREASAM
2010
15 years 1 months ago
Traffic Management and Security Based on Priority Queueing and Multicore Firewall Implementation
We consider the telematics appliances, such as firewall, as a basic part of security system with specific preemptive priority queuing and access control algorithm oriented on multi...
Vladimir S. Zaborovsky, Vladimir Mulukha, Sergey K...