Sciweavers

243 search results - page 24 / 49
» Exception-Based Information Flow Control in Object-Oriented ...
Sort
View
ICSE
2007
IEEE-ACM
15 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
CSFW
2007
IEEE
15 years 1 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
COOPIS
2002
IEEE
15 years 2 months ago
Modeling Coordination and Control in Cross-Organizational Workflows
Current e-service technology paradigms require the analysis and conceptual modeling of cooperative inter-organizational workflows. Cooperation among different organizations is base...
Enzo Colombo, Chiara Francalanci, Barbara Pernici
IASSE
2004
14 years 11 months ago
System Evolution through Design Information Evolution: a Case Study
This paper describes how design information, in our case UML specifications, can be used to evolve a software system and validate the consistency of such an evolution. This work c...
Walter Cazzola, Ahmed Ghoneim, Gunter Saake