Sciweavers

698 search results - page 72 / 140
» dagstuhl 2007
Sort
View
DAGSTUHL
2001
15 years 2 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
DAGSTUHL
2003
15 years 2 months ago
Query Answering in Inconsistent Databases
In this chapter, we summarize the research on querying inconsistent databases we have been conducting over the last five years. The formal framework we have used is based on two c...
Leopoldo E. Bertossi, Jan Chomicki
89
Voted
DAGSTUHL
2003
15 years 2 months ago
On Feature Orientation and on Requirements Encapsulation Using Families of Requirements
Abstract. Naive feature orientation runs into problems with large software systems, such as telephone switching systems. With naive feature orientation, a feature extends a base sy...
Jan Bredereke
111
Voted
DAGSTUHL
2003
15 years 2 months ago
Interactive Mathematical Documents on the Web
This paper deals with our work on interactive mathematical documents. These documents accomodate various sources, users, and mathematical services. Communication of mathematics bet...
Arjeh M. Cohen, Hans Cuypers, Ernesto Reinaldo Bar...
93
Voted
DAGSTUHL
2003
15 years 2 months ago
Operational Semantics of Security Protocols
Based on a concise domain analysis we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e...
Cas J. F. Cremers, Sjouke Mauw