Sciweavers

3233 search results - page 527 / 647
» Rule Modeling and Markup
Sort
View
CSL
2000
Springer
15 years 9 months ago
Subtyping with Power Types
This paper introduces a typed λ-calculus called λPower , a predicative reformulation of part of Cardelli’s power type system. Power types integrate subtyping into the typing t...
David Aspinall
POPL
1999
ACM
15 years 9 months ago
Type-Safe Linking and Modular Assembly Language
Linking is a low-level task that is usually vaguely specified, if at all, by language definitions. However, the security of web browsers and other extensible systems depends cru...
Neal Glew, J. Gregory Morrisett
153
Voted
LICS
1999
IEEE
15 years 9 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
163
Voted
AMET
1998
Springer
15 years 8 months ago
Evolutionary Computing and Negotiating Agents
Automated negotiation has been of particular interest due to the relevant role that negotiation plays among trading agents. This paper presents two types of agent architecture: Cas...
Noyda Matos, Carles Sierra
SP
1997
IEEE
134views Security Privacy» more  SP 1997»
15 years 8 months ago
A Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirement...
Sushil Jajodia, Pierangela Samarati, V. S. Subrahm...