Sciweavers

19003 search results - page 205 / 3801
» We Need Assurance!
Sort
View
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 9 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
SIGSOFT
2010
ACM
13 years 8 months ago
Organizational volatility and its effects on software defects
The key premise of an organization is to allow more efficient production, including production of high quality software. To achieve that, an organization defines roles and reporti...
Audris Mockus
WWW
2001
ACM
14 years 11 months ago
Combining RDF and XML schemas to enhance interoperability between metadata application profiles
The term "application profile" has recently become highly topical. Heery and Patel [1] define application profiles as metadata schemas which consist of metadata elements...
Jane Hunter, Carl Lagoze
OSDI
2008
ACM
14 years 11 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
VLDB
2006
ACM
138views Database» more  VLDB 2006»
14 years 11 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah