Sciweavers

83 search results - page 16 / 17
» Verified enforcement of stateful information release policie...
Sort
View
CADE
2008
Springer
14 years 6 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
14 years 12 days ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
TSMC
2010
13 years 1 months ago
A Petri Net Approach to Analysis and Composition of Web Services
Business Process Execution Language for Web Services (BPEL) is becoming the industrial standard for modeling web service-based business processes. Behavioral compatibility for web ...
PengCheng Xiong, Yushun Fan, MengChu Zhou
SIGOPS
2010
179views more  SIGOPS 2010»
13 years 1 months ago
Online cache modeling for commodity multicore processors
Modern chip-level multiprocessors (CMPs) contain multiple processor cores sharing a common last-level cache, memory interconnects, and other hardware resources. Workloads running ...
Richard West, Puneet Zaroo, Carl A. Waldspurger, X...
IWAN
2000
Springer
13 years 10 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...