Sciweavers

4962 search results - page 773 / 993
» Stochastic Model Checking
Sort
View
FOSSACS
2005
Springer
14 years 1 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICTAC
2005
Springer
14 years 1 months ago
Representation and Reasoning on RBAC: A Description Logic Approach
Abstract. Role-based access control (RBAC) is recognized as an excellent model for access control in large-scale networked applications. Formalization of RBAC in a logical approach...
Chen Zhao, NuerMaimaiti Heilili, Shengping Liu, Zu...
RTA
2005
Springer
14 years 1 months ago
Natural Narrowing for General Term Rewriting Systems
Abstract. For narrowing to be an efficient evaluation mechanism, several lazy narrowing strategies have been proposed, although typically for the restricted case of left-linear con...
Santiago Escobar, José Meseguer, Prasanna T...
UML
2005
Springer
14 years 1 months ago
Weaving Executability into Object-Oriented Meta-languages
Abstract. Nowadays, object-oriented meta-languages such as MOF (MetaObject Facility) are increasingly used to specify domain-specific languages in the model-driven engineering comm...
Pierre-Alain Muller, Franck Fleurey, Jean-Marc J&e...
VSTTE
2005
Springer
14 years 1 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...