Sciweavers

392 search results - page 64 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
VLSID
2001
IEEE
129views VLSI» more  VLSID 2001»
14 years 10 months ago
Design Of Provably Correct Storage Arrays
In this paper we describe a hardware design method for memory and register arrays that allows the application of formal equivalence checking for comparing a high-level register tr...
Rajiv V. Joshi, Wei Hwang, Andreas Kuehlmann
SDMW
2007
Springer
14 years 4 months ago
Query Rewriting Algorithm Evaluation for XML Security Views
Abstract. We investigate the experimental effectiveness of query rewriting over XML security views. Our model consists of access control policies specified over DTDs with XPath e...
Nataliya Rassadko
NDSS
2002
IEEE
14 years 3 months ago
PAMINA: A Certificate Based Privilege Management System
In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distr...
Zoltán Nochta, Peter Ebinger, Sebastian Abe...
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
14 years 2 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
CSIE
2009
IEEE
13 years 11 months ago
On Test Script Technique Oriented Automation of Embedded Software Simulation Testing
Succinct test script with high efficiency is one of key point for automation of embedded software testing. In this paper, we integrated object technique with automated simulation ...
Yongfeng Yin, Bin Liu, Bentao Zheng