Sciweavers

9931 search results - page 1719 / 1987
» Generative Modeling by PRISM
Sort
View
138
Voted
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 9 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
SP
1998
IEEE
106views Security Privacy» more  SP 1998»
15 years 9 months ago
Understanding Java Stack Inspection
Current implementations of Java make security decisions by searching the runtime call stack. These systems have attractive security properties, but they have been criticized as be...
Dan S. Wallach, Edward W. Felten
142
Voted
WETICE
1998
IEEE
15 years 9 months ago
Authorization and Attribute Certificates for Widely Distributed Access Control
We describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geograp...
William E. Johnston, Srilekha Mudumbai, Mary R. Th...
ER
1998
Springer
106views Database» more  ER 1998»
15 years 9 months ago
Chrono: A Conceptual Design Framework for Temporal Entities
Abstract. Database applications are frequently faced with the necessity of representing time varying information and, particularly in the management of information systems, a few k...
Sonia Bergamaschi, Claudio Sartori
ESOP
1998
Springer
15 years 9 months ago
Mode-Automata: About Modes and States for Reactive Systems
Abstract. In the eld of reactive system programming, data ow synchronous languages like Lustre BCH+85,CHPP87 or Signal GBBG85 o er a syntax similar to block-diagrams, and can be e ...
Florence Maraninchi, Yann Rémond
« Prev « First page 1719 / 1987 Last » Next »