Sciweavers

637 search results - page 93 / 128
» The Case for Abstracting Security Policies
Sort
View
ICLP
2003
Springer
15 years 7 months ago
Flow Java: Declarative Concurrency for Java
Abstract. Logic variables pioneered by (concurrent) logic and concurrent constraint programming are powerful mechanisms for automatically synchronizing concurrent computations. The...
Frej Drejhammar, Christian Schulte, Per Brand, Sei...
95
Voted
DRM
2005
Springer
15 years 7 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
120
Voted
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
15 years 6 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
STOC
2001
ACM
151views Algorithms» more  STOC 2001»
16 years 2 months ago
Buffer overflow management in QoS switches
Abstract. We consider two types of buffering policies that are used in network switches supporting Quality of Service (QoS). In the FIFO type, packets must be transmitted in the or...
Alexander Kesselman, Zvi Lotker, Yishay Mansour, B...
WEBDB
1999
Springer
105views Database» more  WEBDB 1999»
15 years 6 months ago
On the Materialization of WebViews
ABSTRACT A WebView is a web page that is automatically created from base data, which are usually drawn from a DBMS. A WebView can be either materialized as an html page at the web...
Alexandros Labrinidis, Nick Roussopoulos