Sciweavers

1210 search results - page 85 / 242
» Secure Logic Synthesis
Sort
View
GCC
2003
Springer
14 years 3 months ago
Study on a Secure Access Model for the Grid Catalogue
To solve the security of access to meta-data in computational Grids, by modifying model BLP, a secure access model named GBLP is introduced to support access control to Grid catalo...
Bing Xie, Xiaolin Gui, Qingjiang Wang
GLVLSI
2007
IEEE
187views VLSI» more  GLVLSI 2007»
14 years 4 months ago
DAG based library-free technology mapping
This paper proposes a library-free technology mapping algorithm to reduce delay in combinational circuits. The algorithm reduces the overall number of series transistors through t...
Felipe S. Marques, Leomar S. da Rosa Jr., Renato P...
SP
1996
IEEE
116views Security Privacy» more  SP 1996»
14 years 2 months ago
Defining Noninterference in the Temporal Logic of Actions
Covert channels are a critical concern for multilevel secure (MLS) systems. Due to their subtlety, it is desirable to use formal methods to analyze MLS systems for the presence of...
Todd Fine
ICST
2009
IEEE
14 years 4 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry
DATE
2009
IEEE
93views Hardware» more  DATE 2009»
14 years 4 months ago
Scalable liveness checking via property-preserving transformations
The ability of logic transformations to enhance safety property checking has been well-established, and many industrial-strength verification solutions accordingly rely ariety of...
Jason Baumgartner, Hari Mony