Sciweavers

1183 search results - page 74 / 237
» On flow-sensitive security types
Sort
View
121
Voted
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
15 years 9 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
116
Voted
CSFW
2007
IEEE
15 years 11 months ago
Do As I SaY! Programmatic Access Control with Explicit Identities
We address the programmatic realization of the access control model of security in distributed systems. Our aim is e the gap between abstract/declarative policies and their concre...
Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, J...
FPL
2008
Springer
153views Hardware» more  FPL 2008»
15 years 6 months ago
FPGA acceleration of quasi-Monte Carlo in finance
Today, quasi-Monte Carlo (QMC) methods are widely used in finance to price derivative securities. The QMC approach is popular because for many types of derivatives it yields an es...
Nathan A. Woods, Tom VanCourt
ATAL
2011
Springer
14 years 4 months ago
Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up
The fastest known algorithm for solving General Bayesian Stackelberg games with a finite set of follower (adversary) types have seen direct practical use at the LAX airport for o...
Manish Jain, Christopher Kiekintveld, Milind Tambe
130
Voted
IACR
2011
124views more  IACR 2011»
14 years 4 months ago
Efficient Multicast Key Distribution Using HOWF-based Access Control Structures
— Both broadcast encryption (BE) protocols and multicast key distribution (MKD) protocols try to solve the same problem of private group communication. For the first time, we dis...
Jing Liu, Qiong Huang, Bo Yang