Sciweavers

256 search results - page 29 / 52
» Separation of NP-Completeness Notions
Sort
View
ICST
2008
IEEE
15 years 6 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
CCS
2007
ACM
15 years 6 months ago
Direct static enforcement of high-level security policies
A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires ...
Qihua Wang, Ninghui Li
FASE
2007
Springer
15 years 6 months ago
Maintaining Consistency in Layered Architectures of Mobile Ad-Hoc Networks
Abstract. In this paper we present a layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (manets) using algebraic higher order nets (aho nets). manets are networ...
Julia Padberg, Kathrin Hoffmann, Hartmut Ehrig, To...
SOFSEM
2007
Springer
15 years 6 months ago
Exact Max 2-Sat: Easier and Faster
Prior algorithms known for exactly solving Max 2-Sat improve upon the trivial upper bound only for very sparse instances. We present new algorithms for exactly solving (in fact, c...
Martin Fürer, Shiva Prasad Kasiviswanathan
UIST
2005
ACM
15 years 5 months ago
Zliding: fluid zooming and sliding for high precision parameter manipulation
High precision parameter manipulation tasks typically require adjustment of the scale of manipulation in addition to the parameter itself. This paper introduces the notion of Zoom...
Gonzalo Ramos, Ravin Balakrishnan