About
9
Publications
279
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
63
Citations
Publications
Publications (9)
An algorithm that uses program dependence graphs for static program analysis to validate secure information flow is presented. The algorithm is able to deal with a wider class of information flow policies than the well-known lattice model of secure information flow. The lattice model requires that the information flow permitted by a flow policy be...
There has been considerable research in database security and
inference control; however, that research deals primarily with
statistical databases. Although some of the mechanisms proposed to deter
compromise artificially introduce dynamicism into these otherwise static
databases, very little effort has been devoted to the area of natural
dynamics....
An estimate of the information a database contains and the
quantification of the vulnerability of that database to compromise by
inferential methods is discussed. Such a measure could be used to
evaluate the deterrent value of extant protection methods and provide a
measure of the potential for inferential compromise through the use of
one of the k...
A mathematical computer programming system, MPS, implements the
simplex algorithm developed for solving the linear programming (LP)
problem. With the fast growing personal computer (PC) technology and the
advent of software packages for the MPS PC, a class of learn-by-doing
MPS users has emerged. Motivated by the fact that entering most LP data
int...
Object-oriented programming has become a popular programming paradigm. The number of researchers in the field has grown since the introduction of the Smalltalk programming language. Researchers interested in knowledge representation are striving to introduce more comprehensive ways to represent knowledge. Proposed is the representation of knowledge...
In order to ensure a better logical data base design that captures the semantics of the enterprise application, two basic approaches, decomposition and synthesis, are employed. The synthesis approach provides a schema that envelops all the given dependencies, though currently applicable to only functional dependencies and only for 3NF. However, the...
The purpose of this study was to create and validate a tool which could be administered to students enrolled in or considering enrollment in an introductory programming course to predict success in the course or alternatively to segregate enrolled students into fast and slow paced sections. Previous work which met the criteria of a self contained p...
This paper describes one approach to answering the need for an
introductory computer science course which will appeal to a university-wide audience. Kansas State University as many other institutions was faces with such a chllenge when financial constraints became more rigid. A large influx of students entered the Computer Science program, and man...