Sciweavers

2979 search results - page 549 / 596
» Modelling secure multiagent systems
Sort
View
SIGOPSE
2004
ACM
15 years 5 months ago
Open problems in data collection networks
Research in sensor networks, continuous queries (CQ), and other domains has been motivated by powerful applications that aim to aggregate, assimilate, and interact with scores of ...
Jonathan Ledlie, Jeffrey Shneidman, Matt Welsh, Me...
LICS
2002
IEEE
15 years 4 months ago
A Syntactic Approach to Foundational Proof-Carrying Code
Proof-Carrying Code (PCC) is a general framework for verifying the safety properties of machine-language programs. PCC proofs are usually written in a logic extended with language...
Nadeem Abdul Hamid, Zhong Shao, Valery Trifonov, S...
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
15 years 1 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...
DRR
2008
15 years 28 days ago
Interactive degraded document enhancement and ground truth generation
Degraded documents are frequently obtained in various situations. Examples of degraded document collections include historical document depositories, document obtained in legal an...
G. Bal, Gady Agam, Ophir Frieder, Gideon Frieder
TCS
2008
14 years 11 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld