Sciweavers

116 search results - page 17 / 24
» Reasoning about XACML policies using CSP
Sort
View
GIS
2010
ACM
13 years 5 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
IPAW
2010
13 years 5 months ago
Provenance of Decisions in Emergency Response Environments
Mitigating the devastating ramifications of major disasters requires emergency workers to respond in a maximally efficient way. Information systems can improve their efficiency by ...
Iman Naja, Luc Moreau, Alex Rogers
RTA
2005
Springer
14 years 1 months ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty
FUIN
2007
99views more  FUIN 2007»
13 years 7 months ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
CIKM
2009
Springer
14 years 2 months ago
A framework for safely publishing communication traces
A communication trace is a detailed record of the communication between two entities. Communication traces are vital for research in computer networks and protocols in many domain...
Abhinav Parate, Gerome Miklau