Sciweavers

1150 search results - page 30 / 230
» Specifying Information-Flow Controls
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
FM
1999
Springer
121views Formal Methods» more  FM 1999»
14 years 1 months ago
Incremental Design of a Power Transformer Station Controller Using a Controller Synthesis Methodology
ÐIn this paper, we describe the incremental specification of a power transformer station controller using a controller synthesis methodology. We specify the main requirements as s...
Hervé Marchand, Mazen Samaan
INFORMATICALT
2008
115views more  INFORMATICALT 2008»
13 years 9 months ago
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Mustafa M. Kocatürk, Taflan I. Gündem
IFIP
2007
Springer
14 years 3 months ago
Global Supply Chain Control
The operation of global manufacturing network is challenging due to the complexity in product and information flow, diversity in sites, localization and processes and the informati...
Heidi C. Dreyer, Ottar Bakås, Erlend Alfnes,...
AUTOMATICA
2006
84views more  AUTOMATICA 2006»
13 years 9 months ago
Optimal control of LTI systems over unreliable communication links
In this paper, optimal control of linear time-invariant (LTI) systems over unreliable communication links is studied. The motivation of the problem comes from growing applications...
Orhan C. Imer, Serdar Yüksel, Tamer Basar