Sciweavers

14 search results - page 2 / 3
» Binder, a Logic-Based Security Language
Sort
View
ICTAI
2009
IEEE
14 years 8 days ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ENTCS
2007
109views more  ENTCS 2007»
13 years 5 months ago
Hybrid Logics and Ontology Languages
Description Logics (DLs) are a family of logic based knowledge representation formalisms. Although they have a range of applications, they are perhaps best known as the basis for ...
Ian Horrocks, Birte Glimm, Ulrike Sattler
SAC
2002
ACM
13 years 5 months ago
Secure mobile agent systems using Java: where are we heading?
Java is the predominant language for mobile agent systems, both for implementing mobile agent execution environments and for writing mobile agent applications. This is due to inhe...
Walter Binder, Volker Roth
IEEEARES
2006
IEEE
13 years 11 months ago
Secure and Reliable Java-Based Middleware - Challenges and Solutions
Java and the Java Virtual Machine (JVM) are a predominant programming language and deployment platform for complex, component-oriented systems. In current standard Java runtime sy...
Walter Binder
ACSD
2008
IEEE
108views Hardware» more  ACSD 2008»
14 years 3 days ago
PicNIc - Pi-calculus non-interference checker
PICNIC is a tool for verifying security properties of systems, namely non-interference properties of processes expressed as terms of the π-calculus with two security levels and d...
Silvia Crafa, Matteo Mio, Marino Miculan, Carla Pi...