Sciweavers

894 search results - page 164 / 179
» Secure Implementation of Channel Abstractions
Sort
View
COMPSAC
2009
IEEE
14 years 12 days ago
A Framework for Cost Sensitive Assessment of Intrusion Response Selection
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
SEMWEB
2001
Springer
14 years 3 days ago
Utilizing Host-Formalisms to Extend RDF-Semantics
Abstract. RDF may be considered as an application of XML intended to interoperably exchange semantics between Web applications. In its current form, this objective may be hard to r...
Wolfram Conen, Reinhold Klapsing
POPL
1999
ACM
13 years 12 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
CAISE
2009
Springer
13 years 11 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
ER
2009
Springer
316views Database» more  ER 2009»
13 years 11 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....