Sciweavers

1821 search results - page 238 / 365
» Security-Aware Program Transformations
Sort
View
FOSSACS
2005
Springer
15 years 10 months ago
History-Based Access Control with Local Policies
Abstract. An extension of the λ-calculus is proposed, to study historybased access control. It allows for security policies with a possibly nested, local scope. We define a type ...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
IWDW
2005
Springer
15 years 10 months ago
Towards Multi-class Blind Steganalyzer for JPEG Images
In this paper, we use the previously proposed calibrated DCT features [9] to construct a Support Vector Machine classifier for JPEG images capable of recognizing which steganograp...
Tomás Pevný, Jessica J. Fridrich
WEBI
2004
Springer
15 years 10 months ago
Using Semantic Graphs in Clustering Process : Enhance Information Level
In this paper, we particularly focused our attention on how to enhance expressivity of ontologies when used as organized space values in a catalogue request process. Using the Wis...
Jean-Sébastien Brunner, Isabelle Berrien
WORDS
2003
IEEE
15 years 10 months ago
Input-Dependency Analysis for Hard Real-Time Software
The execution time of software for hard real-time systems must be predictable. Further, safe and not overly pessimistic bounds for the worst-case execution time (WCET) must be com...
Jan Gustafsson, Björn Lisper, Raimund Kirner,...
136
Voted
ESOP
2003
Springer
15 years 10 months ago
Finite Differencing of Logical Formulas for Static Analysis
Abstract. This paper concerns mechanisms for maintaining the value of an instrumentation predicate (a.k.a. derived predicate or view), defined via a logical formula over core pred...
Thomas W. Reps, Shmuel Sagiv, Alexey Loginov