Sciweavers

129 search results - page 2 / 26
» A Type System and Analysis for the Automatic Extraction and ...
Sort
View
DRM
2003
Springer
13 years 10 months ago
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
In this paper, we present our experiences concerning the enforcement of access rights extracted from ODRL-based digital contracts. We introduce the generalized Contract Schema (Co...
Susanne Guth, Gustaf Neumann, Mark Strembeck
SIGADA
2004
Springer
13 years 10 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
ESOP
2008
Springer
13 years 7 months ago
Just Forget It - The Semantics and Enforcement of Information Erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased o...
Sebastian Hunt, David Sands
TOPLAS
2010
115views more  TOPLAS 2010»
13 years 3 months ago
JavaCOP: Declarative pluggable types for java
program constraints are defined over a program’s abstract syntax tree. The JAVACOP compiler automatically enforces these constraints on programs during compilation. The JAVACOP ...
Shane Markstrum, Daniel Marino, Matthew Esquivel, ...
ICDAR
2003
IEEE
13 years 10 months ago
Font Type Extraction and Character Prototyping Using Gabor Filters
In this paper, we present an automatic method for character prototyping and font type characterization in machine-printed document images at a character level. To do so, we use a ...
Bénédicte Allier, Hubert Emptoz