Sciweavers

1111 search results - page 137 / 223
» Program Analysis as Model Checking of Abstract Interpretatio...
Sort
View
ASM
2010
ASM
15 years 10 months ago
Secrecy UML Method for Model Transformations
Abstract. This paper introduces the subject of secrecy models development by transformation, with formal validation. In an enterprise, constructing a secrecy model is a participato...
Waël Hassan, Nadera Slimani, Kamel Adi, Luigi...
124
Voted
ICCS
2007
Springer
15 years 9 months ago
AIMSS: An Architecture for Data Driven Simulations in the Social Sciences
Abstract. This paper presents a prototype implementation of an intelligent assistance architecture for data-driven simulation specialising in qualitative data in the social science...
Catriona Kennedy, Georgios K. Theodoropoulos, Volk...
ICSE
2008
IEEE-ACM
16 years 4 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
UM
2007
Springer
15 years 9 months ago
A Practical Activity Capture Framework for Personal, Lifetime User Modeling
Abstract. This paper addresses the problem of capturing rich, longterm personal activity logs of users’ interactions with their workstations, for the purpose of deriving predicti...
Max Van Kleek, Howard E. Shrobe
SOSP
1997
ACM
15 years 4 months ago
A Decentralized Model for Information Flow Control
This paper presents a new model for controlling information flow in systems with mutual distrust and decentralized authority. The model allows users to share information with dis...
Andrew C. Myers, Barbara Liskov