Sciweavers

1795 search results - page 105 / 359
» Security Models and Information Flow
Sort
View
126
Voted
CORR
2011
Springer
176views Education» more  CORR 2011»
14 years 10 months ago
Quantitative Synthesis for Concurrent Programs
nt programs, programming abstractions for data parallel programs, software model checking for confidentiality, electronic voting security, synthesis of interface specons for Java ...
Pavol Cerný, Krishnendu Chatterjee, Thomas ...
110
Voted
IEEEIAS
2007
IEEE
15 years 10 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
126
Voted
FGCN
2008
IEEE
196views Communications» more  FGCN 2008»
15 years 10 months ago
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks
This paper proposes a novel secure query processing model for semantic sensor networks. A semantic sensor network (SSN) is a sensor network which includes semantics of sensory dat...
Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong
161
Voted
CASES
2008
ACM
15 years 5 months ago
Active control and digital rights management of integrated circuit IP cores
We introduce the first approach that can actively control multiple hardware intellectual property (IP) cores used in an integrated circuit (IC). The IP rights owner(s) can remotel...
Yousra Alkabani, Farinaz Koushanfar
114
Voted
BIRD
2008
Springer
123views Bioinformatics» more  BIRD 2008»
15 years 5 months ago
E-BioFlow: Different Perspectives on Scientific Workflows
We introduce a new type of workflow design system called e-BioFlow and illustrate it by means of a simple sequence alignment workflow. E-BioFlow, intended to model advanced scienti...
Ingo H. C. Wassink, Han Rauwerda, Paul E. van der ...