Sciweavers

329 search results - page 32 / 66
» A Theory of Secure Control Flow
Sort
View
TRUST
2009
Springer
15 years 4 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
FUIN
2002
100views more  FUIN 2002»
14 years 9 months ago
UPSILON: Universal Programming System with Incomplete Lazy Object Notation
This paper presents a new model of computation that differs from prior models in that it emphasizes data over flow control, has no named variables and has an object-oriented flavo...
Brian Postow, Kenneth W. Regan, Carl H. Smith
DAC
2006
ACM
15 years 10 months ago
State encoding of large asynchronous controllers
A novel method to solve the state encoding problem in Signal Transition Graphs is presented. It is based on the structural theory of Petri nets and can be applied to large specifi...
Josep Carmona, Jordi Cortadella
TON
2010
93views more  TON 2010»
14 years 4 months ago
Equilibrium of Heterogeneous Congestion Control: Optimality and Stability
When heterogeneous congestion control protocols that react to different pricing signals share the same network, the current theory based on utility maximization fails to predict th...
Ao Tang, X. Wei, Stephen H. Low, Mung Chiang