Sciweavers

118 search results - page 21 / 24
» Towards an Algebra for Security Policies
Sort
View
JUCS
2010
130views more  JUCS 2010»
13 years 2 months ago
Toward an Integrated Tool Environment for Static Analysis of UML Class and Sequence Models
: There is a need for more rigorous analysis techniques that developers can use for verifying the critical properties in UML models. The UML-based Specification Environment (USE) t...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
ENTCS
2007
168views more  ENTCS 2007»
13 years 7 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
HICSS
2005
IEEE
103views Biometrics» more  HICSS 2005»
14 years 1 months ago
Legal and Ethical Implications of Employee Location Monitoring
Location technologies allow employers to monitor the location of employees. The technologies range from global positioning systems able to determine outdoor locations worldwide to...
Gundars Kaupins, Robert P. Minch
COLCOM
2009
IEEE
14 years 7 days ago
Building a stateful reference monitor with coloured petri nets
The need for collaboration and information sharing has been recently growing dramatically with the convergence of outsourcing and offshoring, the increasing need to cut costs thro...
Basel Katt, Michael Hafner, Xinwen Zhang
SOUPS
2009
ACM
14 years 2 months ago
The impact of privacy indicators on search engine browsing patterns
Laboratory studies have shown that when online search engines’ results are annotated with privacy indicators, some consumers will pay a premium to make purchases from sites that...
Janice Y. Tsai, Serge Egelman, Lorrie Faith Cranor...