Sciweavers

1795 search results - page 67 / 359
» Security Models and Information Flow
Sort
View
SP
2008
IEEE
162views Security Privacy» more  SP 2008»
13 years 9 months ago
Fable: A Language for Enforcing User-defined Security Policies
This paper presents FABLE, a core formalism for a programming language in which programmers may specify security policies and reason that these policies are properly enforced. In ...
Nikhil Swamy, Brian J. Corcoran, Michael Hicks
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
14 years 3 months ago
Is Information Systems a Reference Discipline?
In recent times, there has been a growing interest in the level of intellectual contribution that IS makes to other disciplines. Much of the debate that has dominated the literatu...
Sridhar P. Nerur, RadhaKanta Mahapatra, Venugopal ...
ICIP
1998
IEEE
14 years 11 months ago
Hardware Architecture for Optical Flow Estimation in Real Time
Optical flow estimation from image sequences has been for several years a mathematical process carried out by general purpose processors in no real time. In this work a specific a...
Aitzol Zuloaga, José Luis Martín, Jo...
ACSAC
2001
IEEE
14 years 1 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 9 months ago
Generalized Secure Distributed Source Coding with Side Information
In this paper, new inner and outer bounds on the achievable compression-equivocation rate region for generalized secure data compression with side information are given that do not...
Somayeh Salimi, Mahmoud Salmasizadeh, Mohammad Rez...