Sciweavers

124 search results - page 15 / 25
» Synthesising verified access control systems in XACML
Sort
View
OSDI
2006
ACM
15 years 10 months ago
XFI: Software Guards for System Address Spaces
XFI is a comprehensive protection system that offers both flexible access control and fundamental integrity guarantees, at any privilege level and even for legacy code in commodit...
Úlfar Erlingsson, George C. Necula, Mart&ia...
IEEESCC
2007
IEEE
15 years 4 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
FPL
2007
Springer
105views Hardware» more  FPL 2007»
15 years 4 months ago
Time Predictable CPU and DMA Shared Memory Access
In this paper, we propose a first step towards a time predictable computer architecture for single-chip multiprocessing (CMP). CMP is the actual trend in server and desktop syste...
Christof Pitter, Martin Schoeberl
ITIIS
2010
191views more  ITIIS 2010»
14 years 8 months ago
Cooperative Multi-relay Scheme for Secondary Spectrum Access
In this paper, we propose a cooperative multi-relay scheme for a secondary system to achieve spectrum access along with a primary system. In the primary network, a primary transmi...
Tran Trung Duy, Hyung Yun Kong
CAI
2006
Springer
14 years 10 months ago
Formal Verification of Security Model Using SPR Tool
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes...
Il-Gon Kim, Miyoung Kang, Jin-Young Choi, Peter D....