Sciweavers

325 search results - page 28 / 65
» Secure safe ambients
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
Centralized Security Labels in Decentralized P2P Networks
This paper describes the design of a peer-to-peer network that supports integrity and confidentiality labeling of shared data. A notion of data ownership privacy is also enforced...
Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Th...
ESOP
2000
Springer
13 years 11 months ago
Secure Information Flow as Typed Process Behaviour
Abstract. We propose a new type discipline for the -calculus in which secure information flow is guaranteed by static type checking. Secrecy levels are assigned to channels and are...
Kohei Honda, Vasco Thudichum Vasconcelos, Nobuko Y...
OOPSLA
2001
Springer
14 years 4 hour ago
Regression Test Selection for Java Software
Regression testing is applied to modified software to provide confidence that the changed parts behave as intended and that the unchanged parts have not been adversely affected ...
Mary Jean Harrold, James A. Jones, Tongyu Li, Dong...
VR
2008
IEEE
129views Virtual Reality» more  VR 2008»
14 years 1 months ago
Object-Capability Security in Virtual Environments
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
AVSS
2007
IEEE
14 years 1 months ago
Detecting hidden objects: Security imaging using millimetre-waves and terahertz
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Radiation at these fre...
Mike C. Kemp