Sciweavers

2043 search results - page 75 / 409
» Reasoning About Security Models
Sort
View
ASE
1998
81views more  ASE 1998»
13 years 10 months ago
Program Understanding as Constraint Satisfaction: Representation and Reasoning Techniques
The process of understanding a source code in a high-level programming language involves complex computation. Given a piece of legacy code and a library of program plan templates, ...
Steven G. Woods, Qiang Yang
COOPIS
2002
IEEE
14 years 3 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
IJISEC
2007
149views more  IJISEC 2007»
13 years 10 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
SIGSOFT
2008
ACM
14 years 11 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
CEEMAS
2005
Springer
14 years 3 months ago
Modelling of Agents' Behavior with Semi-collaborative Meta-agents
Abstract. An autonomous agent may largely benefit from its ability to reconstruct another agent’s reasoning principles from records of past events and general knowledge about th...
Jan Tozicka, Filip Zelezný, Michal Pechouce...