Sciweavers

6952 search results - page 9 / 1391
» The information integrity imperative
Sort
View
ACMSE
2006
ACM
15 years 3 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
POPL
2008
ACM
15 years 10 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
CAISE
2009
Springer
15 years 4 months ago
The Declarative Approach to Business Process Execution: An Empirical Test
Declarative approaches have been proposed to counter the limited flexibility of the traditional imperative modeling paradigm, but little empirical insights are available into thei...
Barbara Weber, Hajo A. Reijers, Stefan Zugal, Wern...
ENTCS
2002
97views more  ENTCS 2002»
14 years 9 months ago
Plan in Maude: Specifying an Active Network Programming Language
PLAN is a language designed for programming active networks, and can more generally be regarded as a model of mobile computation. PLAN generalizes the paradigm of imperative funct...
Mark-Oliver Stehr, Carolyn L. Talcott
IBIS
2006
69views more  IBIS 2006»
14 years 9 months ago
A Framework for Assessing Inter-Organizational Integration of Business Information Systems
: This paper presents a framework for assessing inter-organizational integration of business information systems. The framework is organized along two dimensions, intensity of inte...
Dirk Stelzer, Daniel Fischer, Ina Nirsberger