Sciweavers

1676 search results - page 243 / 336
» Formal Development of Self-organising Systems
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 2 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
VLDB
1990
ACM
143views Database» more  VLDB 1990»
15 years 1 months ago
Synthesizing Database Transactions
Database programming requires having the knowledge of database semantics both to maintain database integrity and to explore more optimization opportunities. Automated programming ...
Xiaolei Qian
ICECCS
2007
IEEE
89views Hardware» more  ICECCS 2007»
15 years 1 months ago
Just-in-Time Certification
Traditional, standards-based approaches to certification are hugely expensive, of questionable credibility when development is outsourced, and a barrier to innovation. This paper ...
John M. Rushby
APSEC
2004
IEEE
15 years 1 months ago
Extending a Graphic Modeling Language to Support Partial and Evolutionary Specification
The notion of partial and evolutionary specification has gained attention both in research and industry in the last years. While many people regard this just as a process issue, w...
Yong Xia, Martin Glinz
CSFW
2004
IEEE
15 years 1 months ago
From Stack Inspection to Access Control: A Security Analysis for Libraries
We present a new static analysis for reviewing the security of libraries for systems, such as JVMs or the CLR, that rely on stack inspection for access control. We describe its im...
Frédéric Besson, Tomasz Blanc, C&eac...