Results 301 to 310 of about 5,907,803 (347)
Some of the next articles are maybe not open access.
Proceedings of the 2020 ACM Workshop on Forming an Ecosystem Around Software Transformation, 2020
Access control and information flow are the two building blocks in the design of secure software. Of the two, access control seems ubiquitous, being widely used in operating systems, databases, firewalls, servers, web applications, and so on. The successes of information flow seem less obvious, and its benefits and potential underappreciated. Yet, when
openaire +2 more sources
Access control and information flow are the two building blocks in the design of secure software. Of the two, access control seems ubiquitous, being widely used in operating systems, databases, firewalls, servers, web applications, and so on. The successes of information flow seem less obvious, and its benefits and potential underappreciated. Yet, when
openaire +2 more sources
2023
Abstract Chapter 6 examines how information flowed through communication networks. Focusing on the data field containing letter descriptions, it begins by examining how changes in a word’s usage over time can be measured, and shows that extracting words with the greatest ranked change in usage is an extremely effective method for ...
Ruth Ahnert, Sebastian E. Ahnert
openaire +1 more source
Abstract Chapter 6 examines how information flowed through communication networks. Focusing on the data field containing letter descriptions, it begins by examining how changes in a word’s usage over time can be measured, and shows that extracting words with the greatest ranked change in usage is an extremely effective method for ...
Ruth Ahnert, Sebastian E. Ahnert
openaire +1 more source
Fundamenta Informaticae, 2013
Process testing as a way to obtain information on confidential data is investigated. Our working formalism is based on an appropriate (probabilistic) process algebra and (probabilistic) testing. We define testing noninterference as well as sets of private actions which execution is guaranteed by a given test and sets of actions which execution could be
openaire +2 more sources
Process testing as a way to obtain information on confidential data is investigated. Our working formalism is based on an appropriate (probabilistic) process algebra and (probabilistic) testing. We define testing noninterference as well as sets of private actions which execution is guaranteed by a given test and sets of actions which execution could be
openaire +2 more sources
1997
Information is a central topic in computer science, cognitive science and philosophy. In spite of its importance in the 'information age', there is no consensus on what information is, what makes it possible, and what it means for one medium to carry information about another.
Jon Barwise, Jerry Seligman
openaire +1 more source
Information is a central topic in computer science, cognitive science and philosophy. In spite of its importance in the 'information age', there is no consensus on what information is, what makes it possible, and what it means for one medium to carry information about another.
Jon Barwise, Jerry Seligman
openaire +1 more source
Informational inference via information flow
12th International Workshop on Database and Expert Systems Applications, 2002Human judgments about information would seem to have an inferential character. The article presents an informational inference mechanism realized via computations of information flow through a high dimensional conceptual space. The conceptual space is realized via the Hyperspace Analogue to Language Algorithm (HAL), which produces vector ...
P.D. Bruza, D. Song
openaire +1 more source
Morphology of ``Information Flow''
Journal of the ACM, 1967Such phrases as “information flow” may be purely metaphorical, or may refer to porterage and storage of physical documents, transmission of signals, power required for signaling, Shannon's Selective Information, changes in the state of one's personal knowledge, propagation of announcements concerning messages, social increase of awareness, propagation ...
openaire +1 more source
Probabilistic Information Flow Security
Fundamenta Informaticae, 2008A formal model for description of probabilistic timing attacks is presented and studied. It is based on a probabilistic timed process algebra, on observations (mappings which make visible only a part of system behavior) and on an information flow. The resulting security properties are studied and compared with other security concepts.
openaire +2 more sources
Designing reliability information flows
Reliability Engineering & System Safety, 2005It is well-known [Reliab. Eng. Syst. Saf. 75 (2002) 295] that in modern development processes it is essential to have an information flow structure that facilitates fast feedback from product users (customers) to departments at the front end, in particular development and production.
Petkova, V.T. +3 more
openaire +2 more sources
Information flows and information objects
INFORMATION AND LAW, 2012The special case of information objects which are formed in the collectives which activity is connected with support of stationary information streams is considered. Effect of erosion of sense of documentary files which arises at the expense of collective mechanisms of processing of the information is discussed.
openaire +3 more sources
Confirming Information Flows in Networks [PDF]
Social networks, be it on the internet or in real life, facilitate information flows. We model this by giving agents incentives to link with others and receive information through those links. In many networks agents will value confirmation of the information they receive from others.
Billand, Pascal +3 more
openaire +6 more sources

