Sciweavers

1929 search results - page 127 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
TACAS
2009
Springer
207views Algorithms» more  TACAS 2009»
15 years 10 months ago
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control
Abstract. Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative Role-Based Access Control (ARBAC) specifies how an RBAC poli...
Mikhail I. Gofman, Ruiqi Luo, Ayla C. Solomon, Yin...
218
Voted
POPL
2005
ACM
16 years 4 months ago
Automated soundness proofs for dataflow analyses and transformations via local rules
We present Rhodium, a new language for writing compiler optimizations that can be automatically proved sound. Unlike our previous work on Cobalt, Rhodium expresses optimizations u...
Sorin Lerner, Todd D. Millstein, Erika Rice, Craig...
ANSS
2005
IEEE
15 years 9 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
BIS
2009
192views Business» more  BIS 2009»
15 years 5 months ago
Advanced Social Features in a Recommendation System for Process Modeling
Abstract. Social software is known to stimulate the exchange and sharing of information among peers. This paper describes how an existing system that supports process builders in c...
Agnes Koschmider, Minseok Song, Hajo A. Reijers
CN
2004
106views more  CN 2004»
15 years 3 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...