Sciweavers

127 search results - page 9 / 26
» Testing Security Properties of Protocol Implementations - a ...
Sort
View
CSFW
2002
IEEE
14 years 1 months ago
Polynomial Fairness and Liveness
Important properties of many protocols are liveness or availability, i.e., that something good happens now and then. In asynchronous scenarios these properties obviously depend on...
Michael Backes, Birgit Pfitzmann, Michael Steiner,...
ICML
2009
IEEE
14 years 9 months ago
Deep transfer via second-order Markov logic
Standard inductive learning requires that training and test instances come from the same distribution. Transfer learning seeks to remove this restriction. In shallow transfer, tes...
Jesse Davis, Pedro Domingos
KBSE
2007
IEEE
14 years 2 months ago
Tools for model-based security engineering: models vs. code
We present tools to support model-based security engineering on both the model and the code level. In the approach supported by these tools, one firstly specifies the securitycr...
Jan Jürjens, Yijun Yu
ESORICS
2000
Springer
14 years 6 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ALS
2003
Springer
14 years 1 months ago
Towards a Four Factor Theory of Anticipatory Learning
This paper takes an overtly anticipatory stance to the understanding of animat learning and behavior. It analyses four major animal learning theories and attempts to identify the a...
Mark Witkowski