Sciweavers

1213 search results - page 16 / 243
» Traceability for System Families
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
15 years 1 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
CORR
2008
Springer
77views Education» more  CORR 2008»
14 years 9 months ago
The Separation of Duty with Privilege Calculus
Abstract. This paper presents Privilege Calculus (PC) as a new approach of knowledge representation for Separation of Duty (SD) in the view of process and intents to improve the re...
Chenggong Lv, Jun Wang, Lu Liu, Weijia You
RE
2008
Springer
14 years 8 months ago
Supporting Requirements Model Evolution throughout the System Life-Cycle
Requirements models are essential not just during system implementation, but also to manage system changes post-implementation. Such models should be supported by a requirements m...
Neil A. Ernst, John Mylopoulos, Yijun Yu, Tien Ngu...
LPAR
2010
Springer
14 years 7 months ago
Infinite Families of Finite String Rewriting Systems and Their Confluence
We introduce parameterized rewrite systems for describing infinite families of finite string rewrite systems depending upon non-negative integer parameters, as well as ways to reas...
Jean-Pierre Jouannaud, Benjamin Monate