Listing 1 - 10 of 117 << page
of 12
>>
Sort by

Book
Resource utilization model for the algorithm to architecture mapping model
Authors: --- --- ---
Year: 1993 Publisher: Norfolk, Virginia : Department of Electrical & Computer Engineering, College of Engineering & Technology, Old Dominion University,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cold-flow model tests to determine static performance of a NASA one-sided ejector nozzle system
Authors: --- ---
Year: 2020 Publisher: Cleveland, Ohio : National Aeronautics and Space Administration, Glenn Research Center,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
Author:
ISBN: 1000012049 3866443986 Year: 2009 Publisher: KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input. This work leverages a technique called program slicing, which is closely connected to IFC and offers many dimensions for improving analysis precision, the most powerful are Path Conditions. Our evaluation shows scalability with a low annotation burden.


Book
Umsetzung des datenschutzrechtlichen Auskunftsanspruchs auf Grundlage von Usage-Control und Data-Provenance-Technologien
Author:
ISBN: 1000128850 3731510820 Year: 2021 Publisher: Karlsruhe KIT Scientific Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

The ever-growing levels of complexity of modern information systems complicate the traceability of processed and stored personal data. The individual citizen is at the mercy of the systems. Data protection law tries to counteract this. The right to information is one instrument of data protection to establish transparency. This work critically evaluates the right to information and creates comprehensive technical preconditions for its exercise.


Book
Applying the take-grant protection model
Authors: --- ---
Year: 1988 Publisher: Hanover, NH : [Washington, D.C.]: Department of Mathematics and Computer Science, Dartmouth College ; [National Aeronautics and Space Administration],

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Experimental measurements of sonic boom signatures using a continuous data acquistion technique
Authors: ---
Year: 2013 Publisher: Hampton, Virginia : National Aeronautics and Space Administration, Langley Research Center,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy.
Authors: ---
Year: 2022 Publisher: New York,NY,United States Association for Computing Machinery

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Bewust beveiligen : een praktische handleiding voor betrouwbare informatievoorziening
Author:
ISBN: 9039521336 Year: 2002 Publisher: Schoonhoven : Academic Service,


Dissertation
Engineering application-level security through aspect-oriented software development
Authors: ---
ISBN: 9056824694 Year: 2004 Publisher: Leuven Katholieke Universiteit Leuven. Faculteit der Toegepaste Wetenschappen

Listing 1 - 10 of 117 << page
of 12
>>
Sort by