Sciweavers

287 search results - page 41 / 58
» As We May Read: The Reading Appliance Revolution
Sort
View
JCS
2008
119views more  JCS 2008»
14 years 9 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
IANDC
2006
77views more  IANDC 2006»
14 years 9 months ago
Lower and upper bounds on obtaining history independence
Abstract. History independent data structures, presented by Micciancio, are data structures that possess a strong security property: even if an intruder manages to get a copy of th...
Niv Buchbinder, Erez Petrank
POPL
2012
ACM
13 years 5 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...
WWW
2010
ACM
15 years 4 months ago
New-web search with microblog annotations
Web search engines discover indexable documents by recursively ‘crawling’ from a seed URL. Their rankings take into account link popularity. While this works well, it introduc...
Tom Rowlands, David Hawking, Ramesh Sankaranarayan...
81
Voted
WWW
2007
ACM
15 years 10 months ago
A novel clustering-based RSS aggregator
In recent years, different commercial Weblog subscribing systems have been proposed to return stories from users' subscribed feeds. In this paper, we propose a novel clusteri...
Xin Li, Jun Yan, Zhi-Hong Deng, Lei Ji, Weiguo Fan...