Sciweavers

1150 search results - page 22 / 230
» Specifying Information-Flow Controls
Sort
View
DAC
2007
ACM
14 years 10 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
RP
2009
Springer
110views Control Systems» more  RP 2009»
14 years 3 months ago
Formalisms for Specifying Markovian Population Models
Abstract. We compare several languages for specifying Markovian population models such as queuing networks and chemical reaction networks. These languages —matrix descriptions, s...
Thomas A. Henzinger, Barbara Jobstmann, Verena Wol...
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 10 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
ICC
2009
IEEE
121views Communications» more  ICC 2009»
13 years 7 months ago
Trust-Based Data Disclosure in Sensor Networks
In sensor networks, privacy can be addressed in different levels of the network stack and at different points of the information flow. This paper presents an application level sche...
Efthimia Aivaloglou, Stefanos Gritzalis
WWW
2010
ACM
14 years 2 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham