Sciweavers

189 search results - page 24 / 38
» Testing and Analysis of Access Control Policies
Sort
View
IEEEPACT
2009
IEEE
14 years 3 months ago
Soft-OLP: Improving Hardware Cache Performance through Software-Controlled Object-Level Partitioning
—Performance degradation of memory-intensive programs caused by the LRU policy’s inability to handle weaklocality data accesses in the last level cache is increasingly serious ...
Qingda Lu, Jiang Lin, Xiaoning Ding, Zhao Zhang, X...
CCS
2010
ACM
13 years 8 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ENTCS
2007
199views more  ENTCS 2007»
13 years 8 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
TWC
2008
103views more  TWC 2008»
13 years 8 months ago
Performance analysis of a cross-layer handoff ordering scheme in wireless networks
In this paper we propose a cross-layer handoff ordering scheme. The frame success rate (FSR) is adopted as the basis of prioritization. Different quality of service (QoS) requireme...
Po-Chiang Lin, Tsungnan Lin, Chiapin Wang
TGC
2005
Springer
14 years 1 months ago
A Practical Formal Model for Safety Analysis in Capability-Based Systems
Abstract. We present a formal system that models programmable abstractions for access control. Composite abstractions and patterns of arbitrary complexity are modeled as a configu...
Fred Spiessens, Peter Van Roy