Sciweavers

979 search results - page 101 / 196
» Developing Dynamic Security Policies
Sort
View
ESORICS
2009
Springer
15 years 7 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
IMC
2010
ACM
15 years 1 months ago
YouTube traffic dynamics and its interplay with a tier-1 ISP: an ISP perspective
In this paper we conduct an extensive and in-depth study of traffic exchanged between YouTube data centers and its users, as seen from the perspective of a tier-1 ISP in Spring 20...
Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang
138
Voted
AGENTS
1999
Springer
15 years 8 months ago
An Adaptive Agent Bidding Strategy Based on Stochastic Modeling
For a dynamic, evolving multiagent auction, we have developed an adaptive agent bidding strategy (called the p-strategy) based on stochastic modeling. The p-strategy takes into ac...
Sunju Park, Edmund H. Durfee, William P. Birmingha...
244
Voted
POPL
2005
ACM
16 years 4 months ago
Statically checking confidentiality via dynamic labels
This paper presents a new approach for verifying confidenfor programs, based on abstract interpretation. The framework is formally developed and proved correct in the theorem prov...
Bart Jacobs, Wolter Pieters, Martijn Warnier
SAC
2008
ACM
15 years 2 months ago
Enhancing web service selection by QoS-based ontology and WS-policy
The Service Oriented Architecture enables the development of flexible large scale-applications in open environments by dynamically combining Web services. Nevertheless, current te...
Sodki Chaari, Youakim Badr, Frédériq...