Sciweavers

2043 search results - page 270 / 409
» Reasoning About Security Models
Sort
View
141
Voted
BNCOD
2004
131views Database» more  BNCOD 2004»
15 years 6 months ago
Teaching SQL - Which Pedagogical Horse for This Course?
A student with a Computing Science degree is expected to have reached a reasonable level of expertise in SQL. SQL is a non-trivial skill to master and is taught with different degr...
Karen Renaud, Judy van Biljon
SPIN
2000
Springer
15 years 8 months ago
A Language Framework for Expressing Checkable Properties of Dynamic Software
Research on how to reason about correctness properties of software systems using model checking is advancing rapidly. Work on exnite-state models from program source code and on ab...
James C. Corbett, Matthew B. Dwyer, John Hatcliff,...
ICALP
2010
Springer
15 years 10 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
NSPW
1998
ACM
15 years 9 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
JCP
2007
121views more  JCP 2007»
15 years 5 months ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray