Filters








11,834 Hits in 7.0 sec

Innovation and Global Issues 1: Extended Abstracts Book [article]

Nurettin Bilici, Ragıp Pehlivanlı, Selçuk Demirkılınç
2021 figshare.com  
It is a valuable academic work that contains extended abstracts of the academic studies presented within the scope of Innovation and Global Issues Congress I in Patara Antique city by InGlobe Academy and  ...  The Messenger of Allah then tested the child and asked him some questions in order to prove that he could not give information about the unseen and that his prophecies were empty.  ...  It is reported in narrations that the Prophet secretly followed the child in order to understand him clearly.  ... 
doi:10.6084/m9.figshare.13634555.v3 fatcat:nlekic2mu5cmze3ad5dn6jorzq

Innovation and Global Issues 1: Extended Abstracts Book [article]

Nurettin Bilici, Ragıp Pehlivanlı, Selçuk Demirkılınç
2021 figshare.com  
The Messenger of Allah then tested the child and asked him some questions in order to prove that he could not give information about the unseen and that his prophecies were empty.  ...  It is reported in narrations that the Prophet secretly followed the child in order to understand him clearly.  ...  Developments in information technologies enable to obtained efficiently and rapidly flow of information required to make managerial decisions (Lim, 2013: 104) .  ... 
doi:10.6084/m9.figshare.13634555.v1 fatcat:q5mkgjq3jrh5jn4ualb2pshj5u

Knowledge sharing, maintenance, and use in online support communities

Derek L. Hansen
2006 CHI '06 extended abstracts on Human factors in computing systems - CHI EA '06  
I appreciate his early confidence in my abilities as I transitioned into the doctoral program and his continual expectations of excellence.  ...  The funding I received as a STIET fellow allowed me to follow my passion and study an online medical support group early in the program, a study that ultimately led to my dissertation topic.  ...  > >The details are all here: [URL included] This is technically a solicitation, and as such violates the list Policies [URL of list policies included].  ... 
doi:10.1145/1125451.1125780 dblp:conf/chi/Hansen06 fatcat:7ea5meupanelvnc5h5zw37wll4

Demonstrating topoS: Theorem-prover-based synthesis of secure network configurations

Cornelius Diekmann, Andreas Korsten, Georg Carle
2015 2015 11th International Conference on Network and Service Management (CNSM)  
In network management, when it comes to security breaches, human error constitutes a dominant factor.  ...  In a case study, we demonstrate topoS by example. For the first time, the complete transition from high-level security goals to both firewall and SDN configurations is presented.  ...  Add scenario-specific knowledge c. Auto-complete information B. Construct security policy C. Construct stateful policy D.  ... 
doi:10.1109/cnsm.2015.7367384 dblp:conf/cnsm/DiekmannKC15 fatcat:mblhjf4sv5aevpoxbutsur7coe

Reflective HCI

Paul Dourish, Janet Finlay, Phoebe Sengers, Peter Wright
2004 Extended abstracts of the 2004 conference on Human factors and computing systems - CHI '04  
Learning to master this responsive space is to be skilled in extending one's own body field.  ...  ABSTRACT Working from literary theory, in this position paper I propose The Uncanny as strategy for a critical approach to the design of robots.  ...  ACKNOWLEDGEMENTS This work is sponsored in part by NSF Award #0238132.  ... 
doi:10.1145/985921.986203 dblp:conf/chi/DourishFSW04 fatcat:2riaoweryzhnza25n4hwbghwha

Enforcing Information Flow Security Properties in Cyber-Physical Systems: A Generalized Framework Based on Compensation

Thoshitha T. Gamage, Bruce M. McMillin, Thomas P. Roth
2010 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops  
in a confidentiality violation.  ...  A viable method to mitigate such violations is to use information flow security based enforcement mechanisms since access control based security models cannot impose restrictions on information propagation  ...  For a state machine abstraction, this allows executions to be extended in multiple possible paths.  ... 
doi:10.1109/compsacw.2010.36 dblp:conf/compsac/GamageMR10 fatcat:fd6ypksue5hfxhu6ookao5wvqi

Towards Forensic Data Flow Analysis of Business Process Logs

Rafael Accorsi, Claus Wonnemann, Thomas Stocker
2011 2011 Sixth International Conference on IT Security Incident Management and IT Forensics  
Abstracting away from the concrete traces, propagation graphs are analyzed with extensional data flow policies that denote what -instead of how -relevant industrial requirements, e.g.  ...  RECIF uses propagation graphs to formally capture the data flow within a process execution.  ...  C. Policy Examples In abstracting away from access right and focusing on the flow of data between subjects, data flow policies capture security requirements in an extensional manner [28] .  ... 
doi:10.1109/imf.2011.13 dblp:conf/imf/AccorsiWS11 fatcat:2voghbkwbve5xbdc5h6ct6pymy

Provably Secure Networks: Methodology and Toolset for Configuration Management [article]

Cornelius Diekmann
2017 arXiv   pre-print
Using the Isabelle interactive proof assistant, we develop two automated, formally verified tools which help uncovering and preventing bugs in network-level access control configurations.  ...  Network administration is an inherently complex task, in particular with regard to security.  ...  Finally, I am also very grateful to my parents Annette and Hermann Diekmann who have supported me and always believed in me.  ... 
arXiv:1708.08228v1 fatcat:ljgwja2k6jgunl5g45jnptqx5m

Automating Software Testing Using Program Analysis

Patrice Godefroid, Peli de Halleux, Aditya V. Nori, Sriram K. Rajamani, Wolfram Schulte, Nikolai Tillmann, Michael Y. Levin
2008 IEEE Software  
m p u t e r S o c i e t y 0 7 4 0 -7 4 5 9 / 0 8 / $ 2 5 . 0 0 © 2 0 0 8 I E E E  ...  Figure 3b shows a finite-state abstraction for the program in Figure 3a . This abstraction is isomorphic to the program's control-flow graph.  ...  Dynamic test generation extends static test generation with additional runtime information, so it's more general and powerful.  ... 
doi:10.1109/ms.2008.109 fatcat:vqi5aww7brgpvhr46juu6kfplq

ct-fuzz: Fuzzing for Timing Leaks [article]

Shaobo He and Michael Emmi and Gabriela Ciocarlie
2019 arXiv   pre-print
In this work we extend testing-based software analysis methodologies to two-safety properties, which enables the precise discovery of information leaks in complex software.  ...  Our approach is capable of exposing violations to any two-safety property expressed as equality between two program traces.  ...  Acknowledgements This work was funded in part by the US Department of Homeland Security (DHS) Science and Technology (S&T) Directorate under contract no. HSHQDC-16-C-00034.  ... 
arXiv:1904.07280v1 fatcat:vys7cgmscnbq7kovfbcy446bfq

Intransitive Noninterference in Dependence Graphs

Christian Hammer, Jens Krinke, Frank Nodes
2006 Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006)  
In classic information flow control (IFC), noninterference guarantees that no information flows from secret input channels to public output channels.  ...  In this paper we define a static analysis that allows intransitive noninterference in combination with contextsensitive analysis for Java bytecode programs.  ...  The first information flow control algorithm based on PDGs for full C was presented by Snelting et al. [8] .  ... 
doi:10.1109/isola.2006.39 dblp:conf/isola/HammerKN06 fatcat:mklybx65krgp3aw44ouquxuv4a

Automatic Certification of Kalman Filters for Reliable Code Generation

E. Denney, B. Fischer, J. Schumann, J. Richardson
2005 2005 IEEE Aerospace Conference  
The tool has been designed with reliability of the generated code in mind and is able to automatically certify that the code it generates is free from various error classes.  ...  Since documentation is an important part of software assurance, AUTOFILTER can also automatically generate various human-readable documents, containing both design and safety related information.  ...  ., C or C++) that is based on algorithms appropriate for the task (e.g., the extended Kalman filter).  ... 
doi:10.1109/aero.2005.1559605 fatcat:gku4zu4rrrai5c4r66gsb5ztne

Why Are Business Processes Not Secure? [chapter]

Günter Müller, Rafael Accorsi
2013 Lecture Notes in Computer Science  
If one makes mistakes or vulnerabilities are left uncovered, huge fraud incidents might happen, the stockowners rebel, the government complains and employees are, in the worst case, deprived from their  ...  despite heavy investment in security.  ...  Figure 2 depicts the array containing both the abstraction layer and the time perspective. This is the security extended enterprise metamodel, as we have been proposing in Freiburg [56] .  ... 
doi:10.1007/978-3-642-42001-6_17 fatcat:kuv4ae56qvcafm6w5lqpulqmoa

Static Program Analysis for Security [chapter]

K Gopinath
2007 The Compiler Design Handbook  
Finally, we discuss static analysis of information flow expressed in a language that has been annotated with flow policies.  ...  In this chapter, we discuss static analysis of the security of a system.  ...  Note that static approaches cannot quantify the leakage of information as the focus is whether a program violated some desired property with respect to information flow.  ... 
doi:10.1201/9781420043839.ch2 fatcat:254roq3ykrecfly3udo6o5xzva

Practical Exception Specifications [chapter]

Donna Malayeri, Jonathan Aldrich
2006 Lecture Notes in Computer Science  
In particular, they are too low-level, too heavyweight, and do not provide adequate support for describing exception policies.  ...  Exception specifications can aid in the tasks of writing correct exception handlers and understanding exceptional control flow, but current exception specification systems are impractical in a number of  ...  and Secure Information Systems."  ... 
doi:10.1007/11818502_11 fatcat:3bvfluorzbdt5d3sep5ingyl4i
« Previous Showing results 1 — 15 out of 11,834 results