Sciweavers

6047 search results - page 103 / 1210
» Modeling with Extend
Sort
View
SP
1998
IEEE
162views Security Privacy» more  SP 1998»
15 years 6 months ago
Complete, Safe Information Flow with Decentralized Labels
The growing use of mobile code in downloaded applications and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Information flow control is in...
Andrew C. Myers, Barbara Liskov
IBERAMIA
2004
Springer
15 years 7 months ago
Well Founded Semantics for Logic Program Updates
Over the last years various semantics have been proposed for dealing with updates of logic programs by (other) logic programs. Most of these semantics extend the stable models sema...
Federico Banti, José Júlio Alferes, ...
COMPSAC
2000
IEEE
15 years 6 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
CAISE
2005
Springer
15 years 7 months ago
On the Semantics of Operation Contracts in Conceptual Modeling
This paper describes two different ways of understanding operation contracts in conceptual modeling: the strict and the extended interpretations. The main difference between them l...
Anna Queralt, Ernest Teniente
QUESTA
2006
98views more  QUESTA 2006»
15 years 1 months ago
Fluid models of integrated traffic and multipath routing
In this paper we consider a stochastic model describing the varying number of flows in a network. This model features flows of two types, namely file transfers (with fixed volume)...
Peter B. Key, Laurent Massoulié