Sciweavers

378 search results - page 44 / 76
» Programming with Explicit Security Policies
Sort
View
COMPSAC
2009
IEEE
14 years 2 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
ADHOC
2007
91views more  ADHOC 2007»
13 years 7 months ago
Non-interactive key establishment in mobile ad hoc networks
We present a new non-interactive key agreement and progression (NIKAP) scheme for mobile ad hoc networks (MANETs), which does not require an on-line centralized authority, can non...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
OOPSLA
2005
Springer
14 years 1 months ago
Interaction-based programming with classages
This paper presents Classages, a novel interaction-centric object-oriented language. Classes and objects in Classages are fully encapsulated, with explicit interfaces for all inte...
Yu David Liu, Scott F. Smith
IJISEC
2010
121views more  IJISEC 2010»
13 years 6 months ago
Flowchart description of security primitives for controlled physical unclonable functions
Physical Unclonable Functions (PUFs) are physical objects that are unique, practically unclonable and that behave like a random function when subjected to a challenge. Their use h...
Boris Skoric, Marc X. Makkes
AI
2000
Springer
13 years 7 months ago
Stochastic dynamic programming with factored representations
Markov decisionprocesses(MDPs) haveproven to be popular models for decision-theoretic planning, but standard dynamic programming algorithms for solving MDPs rely on explicit, stat...
Craig Boutilier, Richard Dearden, Moisés Go...