Sciweavers

1393 search results - page 108 / 279
» Virtual-Channel Flow Control
Sort
View
ENTCS
2008
114views more  ENTCS 2008»
13 years 10 months ago
Term-graph Rewriting in Tom Using Relative Positions
In this paper, we present the implementation in Tom of a de Bruijn indices generalization allowing the representation of term-graphs over an algebraic signature. By adding pattern...
Emilie Balland, Paul Brauner
CSFW
2007
IEEE
14 years 2 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 1 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
CSFW
2004
IEEE
14 years 1 months ago
Enforcing Robust Declassification
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems perform intentional release of sensitive informat...
Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic
ISDO
2000
150views Business» more  ISDO 2000»
13 years 11 months ago
Business-to-Business E-Commerce in a Logistics Domain
Today companies outsource part of the service provisioning to other companies that are not part of their core competence. Companies can use current workflow management systems to ...
Zef Damen, Wijnand Derks, Matthijs Duitshof, Henk ...