Sciweavers

2079 search results - page 365 / 416
» Quantifying Information Flow
Sort
View
AUTOMATICA
2006
84views more  AUTOMATICA 2006»
13 years 7 months ago
Optimal control of LTI systems over unreliable communication links
In this paper, optimal control of linear time-invariant (LTI) systems over unreliable communication links is studied. The motivation of the problem comes from growing applications...
Orhan C. Imer, Serdar Yüksel, Tamer Basar
CN
2006
117views more  CN 2006»
13 years 7 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
DSONLINE
2006
79views more  DSONLINE 2006»
13 years 7 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 7 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
INFSOF
2008
148views more  INFSOF 2008»
13 years 7 months ago
Translating unstructured workflow processes to readable BPEL: Theory and implementation
The Business Process Execution Language for Web Services (BPEL) has emerged as the de-facto standard for implementing processes. Although intended as a language for connecting web ...
Wil M. P. van der Aalst, Kristian Bisgaard Lassen