Sciweavers

2463 search results - page 361 / 493
» Rankings of Directed Graphs
Sort
View
PACT
2005
Springer
14 years 2 months ago
Information Flow Analysis for VHDL
We describe a fragment of the hardware description language VHDL that is suitable for implementing the Advanced Encryption Standard algorithm. We then define an Information Flow a...
Terkel K. Tolstrup, Flemming Nielson, Hanne Riis N...
WAC
2005
Springer
118views Communications» more  WAC 2005»
14 years 2 months ago
Towards a Reliable, Wide-Area Infrastructure for Context-Based Self-management of Communications
Abstract. In this paper we describe ConStruct, a distributed, contextaggregation based service infrastructure which supports the development of context-aware applications. ConStruc...
Graeme Stevenson, Paddy Nixon, Simon A. Dobson
APN
2004
Springer
14 years 2 months ago
Reachability Set Generation for Petri Nets: Can Brute Force Be Smart?
Generating the reachability set is one of the most commonly required step when analyzing the logical or stochastic behavior of a system modeled with Petri nets. Traditional “expl...
Gianfranco Ciardo
ESORICS
2004
Springer
14 years 2 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ...
Jon A. Solworth, Robert H. Sloan
ISW
2004
Springer
14 years 2 months ago
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a si...
Mark Foster, Joseph N. Wilson, Shigang Chen