Sciweavers

1795 search results - page 235 / 359
» Security Models and Information Flow
Sort
View
TCS
2010
13 years 4 months ago
A fluid analysis framework for a Markovian process algebra
Markovian process algebras, such as PEPA and stochastic -calculus, bring a powerful compositional approach to the performance modelling of complex systems. However, the models gen...
Richard A. Hayden, Jeremy T. Bradley
ESOP
2003
Springer
14 years 3 months ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
CAISE
2010
Springer
13 years 11 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
ECIS
2000
13 years 11 months ago
Yarra Valley Water: A Successful Change Programme for a Corporatised Water Utility
Yarra Valley Water, a corporatised water utility achieved the significant efficiencies that are promised from the move towards privatisation. At the same time it substantially imp...
J. Brudenell, Geoff A. Sandy
WWW
2009
ACM
14 years 11 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim