Sciweavers

1795 search results - page 74 / 359
» Security Models and Information Flow
Sort
View
EMISA
2004
Springer
15 years 5 months ago
On the Modeling of Correct Service Flows with BPEL4WS
: Frameworks for composing Web Services offer a promising approach for realizing enterprise-wide and cross-organizational business applications. With BPEL4WS a powerful composition...
Manfred Reichert, Stefanie Rinderle, Peter Dadam
MM
2004
ACM
212views Multimedia» more  MM 2004»
15 years 5 months ago
Nonparametric motion model
Motion information is a powerful cue for visual perception. In the context of video indexing and retrieval, motion content serves as a useful source for compact video representati...
Ling-Yu Duan, Min Xu, Qi Tian, Changsheng Xu
CSFW
2008
IEEE
15 years 1 months ago
End-to-End Enforcement of Erasure and Declassification
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
Stephen Chong, Andrew C. Myers
DSS
2008
97views more  DSS 2008»
14 years 12 months ago
On supply chain cash flow risks
This study models the supply chain related cash flow risks for a business entity measured by the standard deviations of cash inflows, outflows, and netflows of each period in a pl...
Chih-Yang Tsai
ESOP
2010
Springer
15 years 3 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers