Sciweavers

1477 search results - page 40 / 296
» Token flow control
Sort
View
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
13 years 11 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
ICCV
2003
IEEE
15 years 28 days ago
Controlling Model Complexity in Flow Estimation
This paper describes a novel application of Statistical Learning Theory (SLT) to control model complexity in flow estimation. SLT provides analytical generalization bounds suitabl...
Zoran Duric, Fayin Li, Harry Wechsler, Vladimir Ch...
DSN
2006
IEEE
14 years 5 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha
ECIR
2010
Springer
14 years 14 days ago
Mining Neighbors' Topicality to Better Control Authority Flow
Web pages are often recognized by others through contexts. These contexts determine how linked pages influence and interact with each other. When differentiating such interactions,...
Na Dai, Brian D. Davison, Yaoshuang Wang
CONCUR
2010
Springer
14 years 3 days ago
Session Types for Access and Information Flow Control
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both sessi...
Sara Capecchi, Ilaria Castellani, Mariangiola Deza...