Sciweavers

169 search results - page 34 / 34
» Security policy analysis using deductive spreadsheets
Sort
View
IMC
2006
ACM
15 years 6 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
TIC
2000
Springer
137views System Software» more  TIC 2000»
15 years 3 months ago
Scalable Certification for Typed Assembly Language
Abstract. A type-based certifying compiler maps source code to machine code and target-level type annotations. The target-level annotations make it possible to prove easily that th...
Dan Grossman, J. Gregory Morrisett
ER
2004
Springer
169views Database» more  ER 2004»
15 years 5 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
DFN
2003
15 years 1 months ago
Government mandated blocking of foreign Web content
: Blocking of foreign Web content by Internet access providers has been a hot topic for the last 18 months in Germany. Since fall 2001 the state of North-RhineWestphalia very activ...
Maximillian Dornseif