Sciweavers

1081 search results - page 105 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
CSFW
2008
IEEE
14 years 3 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 24 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CAISE
2006
Springer
14 years 18 days ago
Deviational Analyses for Validating Regulations on Real Systems
Deviational analysis is a traditional way of exploring the safety of systems. The results of deviational analysis contribute to traditional safety cases and safety arguments. We ex...
Fiona Polack, Thitima Srivatanakul, Tim Kelly, Joh...
DEXAW
1997
IEEE
99views Database» more  DEXAW 1997»
14 years 1 months ago
A Framework for Dynamic Changes in Workflow Management Systems
Current workflow management systems (WFMSs) are only applicable in a reliable and secure manner, if the business process (BP) to be supported is wellstructured. As ad hoc deviatio...
Manfred Reichert, Peter Dadam
ICTAI
1997
IEEE
14 years 1 months ago
Toward the Optimization of a Class of Black Box Optimization Algorithms
Many black box optimization algorithms have sufcient exibility to allow them to adapt to the varying circumstances they encounter. These capabilities are of two primary sorts: 1) ...
Gang Wang, Erik D. Goodman, William F. Punch III