Sciweavers

12 search results - page 2 / 3
» Checking for k-Anonymity Violation by Views
Sort
View
FM
2009
Springer
124views Formal Methods» more  FM 2009»
13 years 12 months ago
An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method
We present a novel approach to optimize scope-bounded checking programs using a relational constraint solver. Given a program and its correctness specification, the traditional app...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
CSMR
2006
IEEE
13 years 11 months ago
IntensiVE, a toolsuite for documenting and checking structural source-code regularities
As size and complexity of software systems increase, preserving the design and specification of their implementation structure gains importance in order to maintain the evolvabil...
Kim Mens, Andy Kellens
FOIKS
2004
Springer
13 years 9 months ago
Simplification of Integrity Constraints for Data Integration
When two or more databases are combined into a global one, integrity may be violated even when each database is consistent with its own local integrity constraints. Efficient metho...
Henning Christiansen, Davide Martinenghi
PLDI
2005
ACM
13 years 11 months ago
Checking type safety of foreign function calls
We present a multi-lingual type inference system for checking type safety across a foreign function interface. The goal of our system is to prevent foreign function calls from int...
Michael Furr, Jeffrey S. Foster
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 5 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...