Sciweavers

1150 search results - page 75 / 230
» Specifying Information-Flow Controls
Sort
View
DATE
2007
IEEE
56views Hardware» more  DATE 2007»
14 years 4 months ago
Unknown blocking scheme for low control data volume and high observability
This paper presents a new blocking logic to block unknowns for temporal compactors. The proposed blocking logic can reduce data volume required to control the blocking logic and a...
Seongmoon Wang, Wenlong Wei, Srimat T. Chakradhar
EDOC
2003
IEEE
14 years 3 months ago
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
The research vision of the Unified Component Meta Model Framework (UniFrame) is to develop an infrastructure for components that enables a plug and play component environment wher...
Carol C. Burt, Barrett R. Bryant, Rajeev R. Raje, ...
MMB
1997
Springer
126views Communications» more  MMB 1997»
14 years 2 months ago
Goal-oriented Performance Control for Transaction Processing
The performance of current transaction processing systems largely depends on human experts for administration and tuning. These experts have to specify a multitude of internal con...
Erhard Rahm
DATE
2004
IEEE
143views Hardware» more  DATE 2004»
14 years 2 months ago
Fault-Tolerant Deployment of Embedded Software for Cost-Sensitive Real-Time Feedback-Control Applications
Designing cost-sensitive real-time control systems for safetycritical applications requires a careful analysis of the cost/coverage trade-offs of fault-tolerant solutions. This fu...
Claudio Pinello, Luca P. Carloni, Alberto L. Sangi...
TDSC
2008
152views more  TDSC 2008»
13 years 10 months ago
Towards Formal Verification of Role-Based Access Control Policies
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current s...
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qih...