Sciweavers

6293 search results - page 221 / 1259
» Information Flow Testing
Sort
View
IFIP
2010
Springer
14 years 11 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
CAISE
2009
Springer
15 years 10 months ago
The Declarative Approach to Business Process Execution: An Empirical Test
Declarative approaches have been proposed to counter the limited flexibility of the traditional imperative modeling paradigm, but little empirical insights are available into thei...
Barbara Weber, Hajo A. Reijers, Stefan Zugal, Wern...
IEEEIAS
2007
IEEE
15 years 10 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi
INEX
2004
Springer
15 years 9 months ago
Reliability Tests for the XCG and inex-2002 Metrics
In this paper we compare the effectiveness scores and system rankings obtained with the inex-2002 metric, the official measure of INEX 2004, and the XCG metrics proposed in [4] an...
Gabriella Kazai, Mounia Lalmas, Arjen P. de Vries
DMIN
2006
125views Data Mining» more  DMIN 2006»
15 years 5 months ago
Biomedical Hypothesis Generation and Testing by Evolutionary Computation
- Filtering the immense amount of data available electronically over the World Wide Web is an important task of search engines in data mining applications. Users when performing se...
Robert Kozma, Anna L. Buczak