Sciweavers

1895 search results - page 335 / 379
» Using ATL for Checking Models
Sort
View
CCS
2007
ACM
15 years 6 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder
150
Voted
BMCBI
2008
166views more  BMCBI 2008»
14 years 11 months ago
QuantPrime - a flexible tool for reliable high-throughput primer design for quantitative PCR
Background: Medium- to large-scale expression profiling using quantitative polymerase chain reaction (qPCR) assays are becoming increasingly important in genomics research. A majo...
Samuel Arvidsson, Miroslaw Kwasniewski, Diego Maur...
110
Voted
CCS
2005
ACM
15 years 6 months ago
Direct chosen ciphertext security from identity-based techniques
We describe a new encryption technique that is secure in the standard model against adaptive chosen ciphertext (CCA2) attacks. We base our method on two very efficient Identity-Ba...
Xavier Boyen, Qixiang Mei, Brent Waters
ICFEM
2005
Springer
15 years 6 months ago
An Evidential Tool Bus
Abstract. Theorem provers, model checkers, static analyzers, test generators. . . all of these and many other kinds of formal methods tools can contribute to the analysis and devel...
John M. Rushby
ICSE
2005
IEEE-ACM
16 years 19 days ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...