Sciweavers

2432 search results - page 42 / 487
» Cryptographic logical relations
Sort
View
ICFP
2007
ACM
15 years 10 months ago
Relating complexity and precision in control flow analysis
We analyze the computational complexity of kCFA, a hierarchy of control flow analyses that determine which functions may be applied at a given call-site. This hierarchy specifies ...
David Van Horn, Harry G. Mairson
MLQ
2000
88views more  MLQ 2000»
14 years 9 months ago
Logics of Complementarity in Information Systems
: Each information system (or data table) leads to a hierarchy of binary relations on the object set in a natural way; these relational systems can serve as frames for the semantic...
Ivo Düntsch, Ewa Orlowska
AMAI
2008
Springer
14 years 10 months ago
Justification logics, logics of knowledge, and conservativity
Several justification logics have been created, starting with the logic LP, [1]. These can be thought of as explicit versions of modal logics, or of logics of knowledge or belief,...
Melvin Fitting
PVLDB
2010
117views more  PVLDB 2010»
14 years 8 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...
CSL
2006
Springer
15 years 1 months ago
Relating Two Standard Notions of Secrecy
Abstract. Two styles of definitions are usually considered to express that a security protocol preserves the confidentiality of a data s. Reachability-based secrecy means that s sh...
Véronique Cortier, Michaël Rusinowitch...