Sciweavers

285 search results - page 43 / 57
» Relating two formal models of path-vector routing
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 1 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ESORICS
2007
Springer
15 years 1 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li
79
Voted
ISSTA
2006
ACM
15 years 3 months ago
Analyzing architectural styles with alloy
The backbone of many architectures is an architectural style that provides a domain-specific design vocabulary and set of constraints on how that vocabulary can be used. Hence, d...
Jung Soo Kim, David Garlan
ESORICS
1994
Springer
15 years 1 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
SEMWEB
2007
Springer
15 years 3 months ago
Hybrid Alignment Strategy for Anatomical Ontologies: Results of the 2007 Ontology Alignment Contest
An ontology is a formal representation of a domain modeling the entities in the domain and their relations. When a domain is represented by multiple ontologies, there is a need for...
Songmao Zhang, Olivier Bodenreider