Sciweavers

389 search results - page 8 / 78
» Information Flow in the Peer-Reviewing Process
Sort
View
ICUMT
2009
14 years 7 months ago
Information flow security for service compositions
Web services are ubiquitous technologies which are used for integrating business processes and services. As is the case in many other applications, the information processed in we...
Sabina Rossi, Damiano Macedonio
CSFW
2002
IEEE
15 years 2 months ago
Information Flow Security in Dynamic Contexts
We study a security property for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. The security property that we propose in this paper, named Per...
Riccardo Focardi, Sabina Rossi
ICS
1989
Tsinghua U.
15 years 1 months ago
Control flow optimization for supercomputer scalar processing
Control intensive scalar programs pose a very different challenge to highly pipelined supercomputers than vectorizable numeric applications. Function call/return and branch instru...
Pohua P. Chang, Wen-mei W. Hwu
REFSQ
2007
Springer
15 years 3 months ago
Information Flow Between Requirement Artifacts. Results of an Empirical Study
Abstract. Requirements engineering is still an area of software engineering in which theory and practice greatly differ. This work presents the results of an empirical study of ar...
Stefan Winkler
86
Voted
ICDCSW
2005
IEEE
15 years 3 months ago
Specifying Information-Flow Controls
The core problem in risk analysis - determining exploitable paths between attackers and system assets is essentially a problem of determining information flow. It is relatively st...
Howard Chivers, Jeremy Jacob