Sciweavers

1288 search results - page 103 / 258
» Securing aspect composition
Sort
View
CSFW
1999
IEEE
14 years 2 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
CSFW
2006
IEEE
14 years 4 months ago
Games for Controls
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
Krishnendu Chatterjee, Radha Jagadeesan, Corin Pit...
OOPSLA
1990
Springer
14 years 2 months ago
Mixin-based Inheritance
The diverse inheritance mechanisms provided by Smalltalk, Beta, and CLOS are interpreted as different uses of a single underlying construct. Smalltalk and Beta differ primarily in...
Gilad Bracha, William R. Cook
DLOG
2009
13 years 11 months ago
Using Description Logics in Relation Based Access Control
Relation Based Access Control (RelBAC) is an access control model designed for the new scenarios of access control on Web 2.0. Under this model, we discuss in this paper how to for...
Rui Zhang, Alessandro Artale, Fausto Giunchiglia, ...
IEEEPACT
2007
IEEE
14 years 4 months ago
Verification-Aware Microprocessor Design
The process of verifying a new microprocessor is a major problem for the computer industry. Currently, architects design processors to be fast, power-efficient, and reliable. Howe...
Anita Lungu, Daniel J. Sorin