Sciweavers

1995 search results - page 241 / 399
» Belief in Information Flow
Sort
View
WWW
2004
ACM
16 years 1 months ago
Securing web application code by static analysis and runtime protection
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable vulnerabil...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
100
Voted
AAAI
2007
15 years 3 months ago
Equilibria in Heterogeneous Nonmonotonic Multi-Context Systems
We propose a general framework for multi-context reasoning which allows us to combine arbitrary monotonic and nonmonotonic logics. Nonmonotonic bridge rules are used to specify th...
Gerhard Brewka, Thomas Eiter
178
Voted
SIGMOD
2005
ACM
117views Database» more  SIGMOD 2005»
16 years 27 days ago
Relational data mapping in MIQIS
We demonstrate a prototype of the relational data mapping module of MIQIS, a formal framework for investigating information flow in peer-to-peer database management systems. Data ...
George H. L. Fletcher, Catharine M. Wyss
88
Voted
IEEEIAS
2008
IEEE
15 years 7 months ago
Challenges for Security Typed Web Scripting Languages Design
: This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
96
Voted
IWIA
2006
IEEE
15 years 6 months ago
High Robustness Requirements in a Common Criteria Protection Profile
The development of a Common Criteria protection profile for high-robustness separation kernels requires explicit modifications of several Common Criteria requirements as well as e...
Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvin...