Sciweavers

40 search results - page 2 / 8
» Encoding information flow in Aura
Sort
View
IFIP
2010
Springer
13 years 25 days ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
MASCOTS
2008
13 years 7 months ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
JFP
2002
108views more  JFP 2002»
13 years 5 months ago
A calculus with polymorphic and polyvariant flow types
We present CIL , a typed -calculus which serves as the foundation for a typed intermediate language for optimizing compilers for higher-order polymorphic programming languages. Th...
J. B. Wells, Allyn Dimock, Robert Muller, Franklyn...
TVCG
2012
218views Hardware» more  TVCG 2012»
11 years 8 months ago
Flow-Based Local Optimization for Image-to-Geometry Projection
—The projection of a photographic dataset on a 3D model is a robust and widely applicable way to acquire appearance information of an object. The first step of this procedure is...
Matteo Dellepiane, Ricardo Marroquim, Marco Callie...
PLDI
2009
ACM
13 years 10 months ago
Flow-sensitive semantics for dynamic information flow policies
Dynamic information flow policies, such as declassification, are essential for practically useful information flow control systems. However, most systems proposed to date that ...
Niklas Broberg, David Sands