Sciweavers

137
Voted
FOCS
1998
IEEE
15 years 7 months ago
Exponential Separations between Restricted Resolution and Cutting Planes Proof Systems
We prove an exponential lower bound for tree-like Cutting Planes refutations of a set of clauses which has polynomial size resolution refutations. This implies an exponential sepa...
Maria Luisa Bonet, Juan Luis Esteban, Nicola Gales...
141
Voted
ESORICS
2000
Springer
15 years 7 months ago
A Full Bandwidth ATM Firewall
The ATM technology has been specified to provide users with the ability to request quality of service (QoS) for their applicatio ns and to enable high speed communications. Howeve...
Olivier Paul, Maryline Laurent, Sylvain Gombault
144
Voted
ESORICS
2000
Springer
15 years 7 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
109
Voted
ESORICS
2000
Springer
15 years 7 months ago
A Security Framework for a Mobile Agent System
Ciarán Bryce
117
Voted
ESORICS
2000
Springer
15 years 7 months ago
A Formal Semantics for SPKI
We extend the logic and semantics of authorization due to Abadi, Lampson, et al. to support restricted delegation. Our formal model provides a simple interpretation for the variety...
Jon Howell, David Kotz