Sciweavers

445 search results - page 73 / 89
» Authorization and Access Control in IRO-DB
Sort
View
USS
2008
14 years 12 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
PPDP
2010
Springer
14 years 7 months ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch
CCS
2011
ACM
13 years 9 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
CHI
2005
ACM
15 years 10 months ago
tranSticks: physically manipulatable virtual connections
A virtually connected medium called tranStick is described that functions both as a "virtual wire" and as a "memory card" containing a shared space. A user can...
Yuji Ayatsuka, Jun Rekimoto
TEI
2009
ACM
172views Hardware» more  TEI 2009»
15 years 4 months ago
SLAPbook: tangible widgets on multi-touch tables in groupware environments
We present SLAPbook, an application using SLAP, translucent and tangible widgets for use on vision-based multi-touch tabletops in Single Display Groupware (SDG) environments. SLAP...
Malte Weiss, Julie Wagner, Roger Jennings, Yvonne ...