Sciweavers

2250 search results - page 112 / 450
» Authorizing applications in singularity
Sort
View
ESSOS
2010
Springer
15 years 6 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...
JFP
2008
61views more  JFP 2008»
14 years 10 months ago
Control reduction theories: the benefit of structural substitution
The historical design of the call-by-value theory of control relies on the reification of evaluation contexts as regular functions and on the use of ordinary term application for ...
Zena M. Ariola, Hugo Herbelin
CPC
2007
113views more  CPC 2007»
14 years 10 months ago
Regular Partitions of Hypergraphs: Regularity Lemmas
Abstract. Szemer´edi’s regularity lemma for graphs has proved to be a powerful tool with many subsequent applications. The objective of this paper is to extend the techniques de...
Vojtech Rödl, Mathias Schacht
VL
2010
IEEE
201views Visual Languages» more  VL 2010»
14 years 8 months ago
Democratizing Computational Tools for Interaction Designers
I am creating a new programming language and editor that is aimed towards authoring interactive behaviors. This language is intended to allow more interaction designers to write t...
Stephen Oney
CSFW
2008
IEEE
15 years 4 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...