Sciweavers

2422 search results - page 106 / 485
» Security Policy Consistency
Sort
View
ASPLOS
2004
ACM
15 years 10 months ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...
119
Voted
ANOR
2008
108views more  ANOR 2008»
15 years 4 months ago
A consensus model of political decision-making
In this paper, a model of political consensus is introduced. Parties try to reach consensus in forming a government. A government is defined as a pair consisting of a winning coali...
Patrik Eklund, Agnieszka Rusinowska, Harrie C. M. ...
ICCAD
2004
IEEE
191views Hardware» more  ICCAD 2004»
16 years 1 months ago
Checking consistency of C and Verilog using predicate abstraction and induction
edicate Abstraction and Induction Edmund Clarke Daniel Kroening June 25, 2004 CMU-CS-04-131 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 It is common...
Daniel Kroening, Edmund M. Clarke
138
Voted
FOSAD
2009
Springer
15 years 11 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
CSFW
2008
IEEE
15 years 11 months ago
Hyperproperties
Properties, which have long been used for reasoning about systems, are sets of traces. Hyperproperties, introduced here, are sets of properties. Hyperproperties can express securi...
Michael R. Clarkson, Fred B. Schneider