Sciweavers

211 search results - page 28 / 43
» Securing UML Information Flow Using FlowUML
Sort
View
SIGOPS
2008
116views more  SIGOPS 2008»
14 years 9 months ago
Practical techniques for purging deleted data using liveness information
The layered design of the Linux operating system hides the liveness of file system data from the underlying block layers. This lack of liveness information prevents the storage sy...
David Boutcher, Abhishek Chandra
PLDI
2012
ACM
13 years 4 days ago
Language-based control and mitigation of timing channels
We propose a new language-based approach to mitigating timing channels. In this language, well-typed programs provably leak only a bounded amount of information over time through ...
Danfeng Zhang, Aslan Askarov, Andrew C. Myers
BPM
2007
Springer
118views Business» more  BPM 2007»
15 years 3 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal
IFIP
2010
Springer
14 years 4 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
68
Voted
DAWAK
2008
Springer
14 years 11 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi