Sciweavers

1210 search results - page 140 / 242
» Secure Logic Synthesis
Sort
View
EMSOFT
2004
Springer
15 years 3 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
EVOW
2001
Springer
15 years 2 months ago
ARPIA: A High-Level Evolutionary Test Signal Generator
The integrated circuits design flow is rapidly moving towards higher description levels. However, test-related activities are lacking behind this trend, mainly since effective faul...
Fulvio Corno, Gianluca Cumani, Matteo Sonza Reorda...
ICTAI
2009
IEEE
15 years 4 months ago
Managing Authorization Provenance: A Modal Logic Based Approach
Abstract—In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy langua...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
OOPSLA
2007
Springer
15 years 4 months ago
No ifs, ands, or buts: uncovering the simplicity of conditionals
Schematic tables are a new representation for conditionals. Roughly a cross between decision tables and data flow graphs, they represent computation and decision-making orthogona...
Jonathan Edwards
SIGMOD
2004
ACM
170views Database» more  SIGMOD 2004»
15 years 10 months ago
A Formal Analysis of Information Disclosure in Data Exchange
We perform a theoretical study of the following queryview security problem: given a view V to be published, does V logically disclose information about a confidential query S? The...
Gerome Miklau, Dan Suciu