Sciweavers

3420 search results - page 103 / 684
» A Language-Based Approach to Security
Sort
View
ESORICS
2010
Springer
15 years 3 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
JPDC
2007
86views more  JPDC 2007»
15 years 3 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
TRUSTBUS
2010
Springer
15 years 2 months ago
Security for Dynamic Service-Oriented eCollaboration - Architectural Alternatives and Proposed Solution
Abstract. Current challenges on the markets cause companies to interact with one another and strive after becoming members of virtual organizations assuming that in doing so they c...
Christoph Fritsch, Günther Pernul
ISSA
2008
15 years 5 months ago
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing
The approach to information security governance has predominantly followed a functionalist paradigm with emphasis placed on formalized rule structures and policy frameworks. The a...
Kennedy Njenga, Irwin Brown
115
Voted
DATE
2003
IEEE
87views Hardware» more  DATE 2003»
15 years 9 months ago
A Proposal for Transaction-Level Verification with Component Wrapper Language
We propose a new approach to accelerate transaction level verification by raising the productivity of the verification suites including test patterns, protocol checker, and simula...
Koji Ara, Kei Suzuki