Sciweavers

805 search results - page 92 / 161
» On the Semantics of Conditional Commitment
Sort
View
CCS
2004
ACM
15 years 9 months ago
Security policies for downgrading
A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Stephen Chong, Andrew C. Myers
FMCAD
2008
Springer
15 years 6 months ago
Mechanized Information Flow Analysis through Inductive Assertions
We present a method for verifying information flow properties of software programs using inductive assertions and theorem proving. Given a program annotated with information flow a...
Warren A. Hunt Jr., Robert Bellarmine Krug, Sandip...
LREC
2008
72views Education» more  LREC 2008»
15 years 5 months ago
Extraction of Attribute Concepts from Japanese Adjectives
ibe various syntactic and semantic conditions for finding abstract nouns which refer to concepts of adjectives from a text, in an attempt to explore the creation of a thesaurus fr...
Kyoko Kanzaki, Francis Bond, Noriko Tomuro, Hitosh...
ENTCS
2008
91views more  ENTCS 2008»
15 years 4 months ago
Towards Concrete Syntax Patterns for Logic-based Transformation Rules
Logic meta-programming in Prolog is a powerful way to express program analysis and transformation. However, its use can be difficult and error-prone because it requires programmer...
Malte Appeltauer, Günter Kniesel
JANCL
2008
133views more  JANCL 2008»
15 years 4 months ago
Modal logic and invariance
Consider any logical system, what is its natural repertoire of logical operations? This question has been raised in particular for first-order logic and its extensions with genera...
Johan van Benthem, Denis Bonnay