Sciweavers

1210 search results - page 194 / 242
» Secure Logic Synthesis
Sort
View
WEBNET
1996
14 years 14 days ago
Modelling alter egos in cyberspace: Who is responsible?
Abstract: Alter Egos represent people in Cyberspace. An Alter Ego is a kind of intelligent agent who is active in performing actions in behalf of the person it represents. How thes...
Reind P. van de Riet, J. F. M. Burg
DKE
2002
130views more  DKE 2002»
13 years 11 months ago
Smart card embedded information systems: a methodology for privacy oriented architectural design
The design of very small databases for smart cards and for portable embedded systems is deeply constrained by the peculiar features of the physical medium. Privacy concerns are re...
Cristiana Bolchini, Fabio A. Schreiber
SAC
2010
ACM
13 years 9 months ago
A machine-checked soundness proof for an efficient verification condition generator
Verification conditions (VCs) are logical formulae whose validity implies the correctness of a program with respect to a specification. The technique of checking software properti...
Frédéric Vogels, Bart Jacobs 0002, F...
XMLSEC
2003
ACM
14 years 4 months ago
An access control framework for business processes for web services
Business Processes for Web Services are the new paradigm for the lightweight integration of business from different enterprises. Whereas the security and access control policies ...
Hristo Koshutanski, Fabio Massacci
EUROSYS
2007
ACM
14 years 8 months ago
Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors
Hypervisors, popularized by Xen and VMware, are quickly becoming commodity. They are appropriate for many usage scenarios, but there are scenarios that require system virtualizatio...
Stephen Soltesz, Herbert Pötzl, Marc E. Fiucz...