Sciweavers

12637 search results - page 109 / 2528
» Security for Extensible Systems
Sort
View
USENIX
2007
13 years 11 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
ASIACRYPT
2001
Springer
14 years 1 months ago
Unbelievable Security. Matching AES Security Using Public Key Systems
The Advanced Encryption Standard (AES) provides three levels of security: 128, 192, and 256 bits. Given a desired level of security for the AES, this paper discusses matching publi...
Arjen K. Lenstra
AH
2004
Springer
14 years 2 months ago
Time-Based Extensions to Adaptation Techniques
Abstract. In this paper we present an approach to time-based adaptation in adaptive hypermedia systems. Time is used as a part of the context (or environment) model. We have propos...
Mária Bieliková, Rastislav Habala
FMOODS
2003
13 years 10 months ago
On Mobility Extensions of UML Statecharts. A Pragmatic Approach
In this paper an extension of a behavioural subset of UML Statecharts for modeling mobility issues is proposed. In this extension we relax the unique association between each State...
Diego Latella, Mieke Massink
CSL
2010
Springer
13 years 9 months ago
Signature Extensions Preserve Termination - An Alternative Proof via Dependency Pairs
Abstract. We give the first mechanized proof of the fact that for showing termination of a term rewrite system, we may restrict to well-formed terms using just the function symbols...
Christian Sternagel, René Thiemann