Sciweavers

2043 search results - page 90 / 409
» Reasoning About Security Models
Sort
View
JODS
2007
138views Data Mining» more  JODS 2007»
13 years 10 months ago
A Formal Framework for Adaptive Access Control Models
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
IJCAI
2003
14 years 10 hour ago
Layered Mereotopology
In fields such as medicine, geography, and mechanics, spatial reasoning involves reasoning about entities—for example cavities and invading particles—that may coincide without...
Maureen Donnelly
LCPC
2004
Springer
14 years 4 months ago
Power-Aware Scheduling for Parallel Security Processors with Analytical Models
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS)...
Yung-Chia Lin, Yi-Ping You, Chung-Wen Huang, Jenq ...
BROADNETS
2006
IEEE
14 years 4 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
POPL
2012
ACM
12 years 6 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama