Sciweavers

5722 search results - page 255 / 1145
» Security Function Interactions
Sort
View
RECOMB
2001
Springer
16 years 3 months ago
Towards predicting coiled-coil protein interactions
Protein-protein interactions play a central role in many cellular functions, and as whole-genome data accumulates, computational methods for predicting these interactions become i...
Mona Singh, Peter S. Kim
IUI
2006
ACM
15 years 9 months ago
Multimodal interaction styles for hypermedia adaptation
We explore the concept of interaction styles used to navigate through hypermedia systems. A demonstrator was built to conduct a user study with the objective of detecting whether ...
Ronnie Taib, Natalie Ruiz
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
15 years 10 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
CSFW
2004
IEEE
15 years 6 months ago
Secure Information Flow by Self-Composition
Non-interference is a high-level security property that guarantees the absence of illicit information leakages through executing programs. More precisely, non-interference for a p...
Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk
DBSEC
2001
129views Database» more  DBSEC 2001»
15 years 4 months ago
Secure Role-Based Workflow Models
: In this paper we introduce a series of reference models for Secure Role-Based Workflow systems. We build our models over the well-known RBAC96 framework. 96 model supports the no...
Savith Kandala, Ravi S. Sandhu