Sciweavers

1407 search results - page 152 / 282
» Systems Theory Model for Information Security
Sort
View
PLDI
2003
ACM
14 years 1 months ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
SACMAT
2003
ACM
14 years 1 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
14 years 1 months ago
Great principles in computing curricula
The nearly three dozen core technologies of computing sit in a simple framework defined by great principles and by computing practices. The great principles are of two kinds, mech...
Peter J. Denning
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
14 years 1 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
CDC
2009
IEEE
118views Control Systems» more  CDC 2009»
14 years 9 days ago
The Kullback-Leibler rate metric for comparing dynamical systems
This paper is concerned with information theoretic "metrics" for comparing two dynamical systems. Following the recent work of Tryphon Georgiou [1], we outline a predicti...
Sun Yu, Prashant G. Mehta