Sciweavers

1150 search results - page 89 / 230
» Specifying Information-Flow Controls
Sort
View
POLICY
2007
Springer
14 years 2 months ago
XACML Function Annotations
XACML is being increasingly adopted in large enterprise systems for specifying access control policies. However, the efficient analysis and integration of multiple policies in suc...
Prathima Rao, Dan Lin, Elisa Bertino
HICSS
2006
IEEE
126views Biometrics» more  HICSS 2006»
14 years 2 months ago
A Model for Temporal Interval Authorizations
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with subjects and...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
CC
2001
Springer
177views System Software» more  CC 2001»
14 years 26 days ago
Imperative Program Transformation by Rewriting
Abstract. We present a method of specifying standard imperative program optimisations as a rewrite system. To achieve this we have extended the idea of matching sub-terms in expres...
David Lacey, Oege de Moor
HYBRID
1998
Springer
14 years 17 days ago
Equations on Timed Languages
We continue investigation of languages, accepted by timed automata of Alur and Dill. In [ACM97] timed regular expressions equivalent to timed automata were introduced. Here we intr...
Eugene Asarin
CAV
2006
Springer
125views Hardware» more  CAV 2006»
14 years 2 days ago
cascade: C Assertion Checker and Deductive Engine
We present a tool, called CAsCaDE, to check assertions in C programs as part of a multi-stage verification strategy. CAsCaDE takes as input a C program and a control file (the outp...
Nikhil Sethi, Clark Barrett