Sciweavers

1821 search results - page 238 / 365
» Security-Aware Program Transformations
Sort
View
FOSSACS
2005
Springer
14 years 3 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
IWDW
2005
Springer
14 years 3 months ago
Towards Multi-class Blind Steganalyzer for JPEG Images
In this paper, we use the previously proposed calibrated DCT features [9] to construct a Support Vector Machine classifier for JPEG images capable of recognizing which steganograp...
Tomás Pevný, Jessica J. Fridrich
WEBI
2004
Springer
14 years 3 months ago
Using Semantic Graphs in Clustering Process : Enhance Information Level
In this paper, we particularly focused our attention on how to enhance expressivity of ontologies when used as organized space values in a catalogue request process. Using the Wis...
Jean-Sébastien Brunner, Isabelle Berrien
WORDS
2003
IEEE
14 years 3 months ago
Input-Dependency Analysis for Hard Real-Time Software
The execution time of software for hard real-time systems must be predictable. Further, safe and not overly pessimistic bounds for the worst-case execution time (WCET) must be com...
Jan Gustafsson, Björn Lisper, Raimund Kirner,...
ESOP
2003
Springer
14 years 2 months ago
Finite Differencing of Logical Formulas for Static Analysis
Abstract. This paper concerns mechanisms for maintaining the value of an instrumentation predicate (a.k.a. derived predicate or view), defined via a logical formula over core pred...
Thomas W. Reps, Shmuel Sagiv, Alexey Loginov