Sciweavers

495 search results - page 89 / 99
» Signed quorum systems
Sort
View
CHI
2005
ACM
16 years 3 months ago
The rotating compass: a novel interaction technique for mobile navigation
In current mobile navigation systems users receive the navigational instructions on a visual display or by descriptive audio. The mapping between the provided navigation informati...
Enrico Rukzio, Albrecht Schmidt, Antonio Krüg...
236
Voted
POPL
2008
ACM
16 years 3 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
119
Voted
IM
1997
15 years 4 months ago
Conflict Analysis for Management Policies
Policies are a means of influencing management behaviour within a distributed system, without coding the behaviour into the managers. Authorisation policies specify what activitie...
Emil Lupu, Morris Sloman
143
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 10 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
153
Voted
WOLLIC
2009
Springer
15 years 10 months ago
Classic-Like Analytic Tableaux for Finite-Valued Logics
The paper provides a recipe for adequately representing a very inclusive class of finite-valued logics by way of tableaux. The only requisite for applying the method is that the o...
Carlos Caleiro, João Marcos