Sciweavers

ICTCS
2005
Springer
14 years 6 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ICTCS
2005
Springer
14 years 6 months ago
A Typed Semantics of Higher-Order Store and Subtyping
Abstract. We consider a call-by-value language, with higher-order functions, records, references to values of arbitrary type, and subtyping. We adapt an intrinsic denotational mode...
Jan Schwinghammer
ICTCS
2005
Springer
14 years 6 months ago
Improved Exact Exponential Algorithms for Vertex Bipartization and Other Problems
Abstract. We study efficient exact algorithms for several problems including Vertex Bipartization, Feedback Vertex Set, 3-Hitting Set, Max Cut in graphs with maximum degree at most...
Venkatesh Raman, Saket Saurabh, Somnath Sikdar