Sciweavers

5188 search results - page 39 / 1038
» Information Flow in Interactive Systems
Sort
View
CSFW
1996
IEEE
15 years 4 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
NETWORKING
2004
15 years 1 months ago
The Role of Information Update in Flow Control
A common feature of congestion control protocols is the presence of information packets used to signal congestion. We address here the question of how frequently such protocols nee...
Eitan Altman, Tamer Basar, Naceur Malouch
WSC
2004
15 years 1 months ago
Using Dynamic Multiresolution Modelling to Analyze Large Material Flow Systems
The interactive, simulation-aided analysis of material flow systems is often done with the help of virtual reality. If a user wants to influence the simulation run, the simulation...
Wilhelm Dangelmaier, Bengt Mueck
EDBT
2009
ACM
144views Database» more  EDBT 2009»
15 years 3 months ago
Efficient maintenance techniques for views over active documents
Many Web applications are based on dynamic interactions between Web components exchanging flows of information. Such a situation arises for instance in mashup systems or when moni...
Serge Abiteboul, Pierre Bourhis, Bogdan Marinoiu
ESOP
2010
Springer
15 years 9 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh