Sciweavers

288 search results - page 35 / 58
» Formal Analysis of Workflow Systems with Security Considerat...
Sort
View
CSFW
2006
IEEE
15 years 3 months ago
Games for Controls
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
Krishnendu Chatterjee, Radha Jagadeesan, Corin Pit...
ECBS
2005
IEEE
58views Hardware» more  ECBS 2005»
15 years 3 months ago
MoDeII: Modeling and Analyzing Time-Constraints
The fulfillment of time requirements is one of the major acceptance criteria of safety-critical and real-time systems. They are dictated by the environment of these systems and a...
Jewgenij Botaschanjan, Jan Jürjens
UML
2005
Springer
15 years 3 months ago
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques
Abstract. Aspect-Oriented Modeling (AOM) techniques allow software designers to isolate and address separately solutions for crosscutting concerns (such as security, reliability, n...
Hui Shen, Dorina C. Petriu
ESORICS
2009
Springer
15 years 10 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
TLDI
2003
ACM
102views Formal Methods» more  TLDI 2003»
15 years 3 months ago
A typed interface for garbage collection
An important consideration for certified code systems is the interaction of the untrusted program with the runtime system, most notably the garbage collector. Most certified cod...
Joseph Vanderwaart, Karl Crary