Sciweavers

495 search results - page 89 / 99
» Signed quorum systems
Sort
View
CHI
2005
ACM
15 years 10 months ago
The rotating compass: a novel interaction technique for mobile navigation
In current mobile navigation systems users receive the navigational instructions on a visual display or by descriptive audio. The mapping between the provided navigation informati...
Enrico Rukzio, Albrecht Schmidt, Antonio Krüg...
POPL
2008
ACM
15 years 9 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
IM
1997
14 years 10 months ago
Conflict Analysis for Management Policies
Policies are a means of influencing management behaviour within a distributed system, without coding the behaviour into the managers. Authorisation policies specify what activitie...
Emil Lupu, Morris Sloman
85
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 4 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
WOLLIC
2009
Springer
15 years 4 months ago
Classic-Like Analytic Tableaux for Finite-Valued Logics
The paper provides a recipe for adequately representing a very inclusive class of finite-valued logics by way of tableaux. The only requisite for applying the method is that the o...
Carlos Caleiro, João Marcos