Sciweavers

1456 search results - page 257 / 292
» The Layer-Independent Descriptor Concept
Sort
View
86
Voted
PLDI
2006
ACM
15 years 4 months ago
Precise alias analysis for static detection of web application vulnerabilities
The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
104
Voted
SACMAT
2006
ACM
15 years 4 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
107
Voted
SCESM
2006
ACM
238views Algorithms» more  SCESM 2006»
15 years 4 months ago
Nobody's perfect: interactive synthesis from parametrized real-time scenarios
As technical systems keep growing more complex and sophisticated, designing software for the safety-critical coordination between their components becomes increasingly difficult....
Holger Giese, Stefan Henkler, Martin Hirsch, Flori...
93
Voted
SIGMETRICS
2006
ACM
102views Hardware» more  SIGMETRICS 2006»
15 years 4 months ago
On the way to a distributed systems calculus: an end-to-end network calculus with data scaling
Network calculus is a min-plus system theory which facilitates the efficient derivation of performance bounds for networks of queues. It has successfully been applied to provide e...
Markus Fidler, Jens B. Schmitt
87
Voted
WIKIS
2006
ACM
15 years 4 months ago
Semantic Wikipedia
Wikipedia is the world’s largest collaboratively edited source of encyclopaedic knowledge. But in spite of its utility, its contents are barely machine-interpretable. Structural...
Heiko Haller, Markus Krötzsch, Max Völke...