Sciweavers

705 search results - page 17 / 141
» Security Policy Coordination for Heterogeneous Information S...
Sort
View
CORR
2011
Springer
189views Education» more  CORR 2011»
14 years 5 months ago
Secure Routing in Wireless Mesh Networks
— This paper introduces Policy based Management Information Base to mange danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management fun...
Jaydip Sen
PPDP
2005
Springer
15 years 3 months ago
Security policy in a declarative style
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Rachid Echahed, Frédéric Prost
POPL
2005
ACM
15 years 10 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
ESOP
2005
Springer
15 years 3 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
GECCO
2010
Springer
180views Optimization» more  GECCO 2010»
14 years 12 months ago
Coevolution of heterogeneous multi-robot teams
Evolving multiple robots so that each robot acting independently can contribute to the maximization of a system level objective presents significant scientific challenges. For e...
Matt Knudson, Kagan Tumer