Sciweavers

65 search results - page 4 / 13
» Correcting Access Restrictions to a Consequence
Sort
View
ECOOP
1993
Springer
13 years 9 months ago
A Language Framework for Multi-Object Coordination
Abstract. We have developed language support for the expression of multiobject coordination. In our language, coordination patterns can be speci ed abstractly, independent of the p...
Svend Frølund, Gul Agha
PVLDB
2010
111views more  PVLDB 2010»
13 years 15 days ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
FASE
2008
Springer
13 years 7 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
SERVICES
2010
123views more  SERVICES 2010»
13 years 7 months ago
Testbeds for Emulating Dependability Issues of Mobile Web Services
Today's ubiquitous internet access has opened new opportunities for mobile workers. By using portable devices, the workers are not only able to access their company's dat...
Lukasz Juszczyk, Schahram Dustdar
FM
1999
Springer
109views Formal Methods» more  FM 1999»
13 years 10 months ago
Compositional Symmetric Sharing in B
Sharing between B constructs is limited, both on the specification and the implementation level. The limitations stem from the single writer/multiple readers paradigm, restricted ...
Martin Büchi, Ralph-Johan Back