Sciweavers

1788 search results - page 36 / 358
» Integrating Security into the Curriculum
Sort
View
SP
1990
IEEE
15 years 3 months ago
Some Conundrums Concerning Separation of Duty
This paper examines some questions concerning commercial computer security integrity policies. We give an example of a dynamic separation of duty policy which cannot be implemente...
M. J. Nash, K. R. Poland
ENTCS
2007
112views more  ENTCS 2007»
14 years 11 months ago
A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
JAR
2006
99views more  JAR 2006»
14 years 11 months ago
An Integrated Approach to High Integrity Software Verification
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...
MOC
2010
14 years 6 months ago
Integral deferred correction methods constructed with high order Runge-Kutta integrators
Spectral deferred correction (SDC) methods for solving ordinary differential equations (ODEs) were introduced by Dutt, Greengard and Rokhlin [5]. It was shown in [5] that SDC metho...
Andrew J. Christlieb, Benjamin W. Ong, Jing-Mei Qi...