Sciweavers

2043 search results - page 270 / 409
» Reasoning About Security Models
Sort
View
BNCOD
2004
131views Database» more  BNCOD 2004»
15 years 2 months ago
Teaching SQL - Which Pedagogical Horse for This Course?
A student with a Computing Science degree is expected to have reached a reasonable level of expertise in SQL. SQL is a non-trivial skill to master and is taught with different degr...
Karen Renaud, Judy van Biljon
105
Voted
SPIN
2000
Springer
15 years 4 months ago
A Language Framework for Expressing Checkable Properties of Dynamic Software
Research on how to reason about correctness properties of software systems using model checking is advancing rapidly. Work on exnite-state models from program source code and on ab...
James C. Corbett, Matthew B. Dwyer, John Hatcliff,...
108
Voted
ICALP
2010
Springer
15 years 5 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
NSPW
1998
ACM
15 years 5 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
136
Voted
JCP
2007
121views more  JCP 2007»
15 years 21 days ago
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
— Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious br...
Sudip Chakraborty, Indrajit Ray