Sciweavers

1795 search results - page 74 / 359
» Security Models and Information Flow
Sort
View
EMISA
2004
Springer
14 years 3 months ago
On the Modeling of Correct Service Flows with BPEL4WS
: Frameworks for composing Web Services offer a promising approach for realizing enterprise-wide and cross-organizational business applications. With BPEL4WS a powerful composition...
Manfred Reichert, Stefanie Rinderle, Peter Dadam
MM
2004
ACM
212views Multimedia» more  MM 2004»
14 years 3 months ago
Nonparametric motion model
Motion information is a powerful cue for visual perception. In the context of video indexing and retrieval, motion content serves as a useful source for compact video representati...
Ling-Yu Duan, Min Xu, Qi Tian, Changsheng Xu
CSFW
2008
IEEE
13 years 11 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
DSS
2008
97views more  DSS 2008»
13 years 9 months ago
On supply chain cash flow risks
This study models the supply chain related cash flow risks for a business entity measured by the standard deviations of cash inflows, outflows, and netflows of each period in a pl...
Chih-Yang Tsai
ESOP
2010
Springer
14 years 1 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers