Sciweavers

429 search results - page 60 / 86
» Compositionality of Secure Information Flow
Sort
View
155
Voted
ICISC
1998
132views Cryptology» more  ICISC 1998»
15 years 5 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
144
Voted
TCS
2008
15 years 3 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
141
Voted
ICCS
2001
Springer
15 years 8 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
137
Voted
BPM
2007
Springer
118views Business» more  BPM 2007»
15 years 10 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
146
Voted
CAISE
2003
Springer
15 years 7 months ago
A Specification Approach to Compose Mobile Web Services Using Service Chart Diagrams
We present our work on composing mobile Web services, denoted by M-services, in the wireless world. The wireless world has its own features that make it completely different from t...
Zakaria Maamar, Mohammed Lahkim