Learn More
We present Flow-based Management Language (FML), a declarative policy language for managing the configuration of enterprise networks. FML was designed to replace the many disparate configuration mechanisms traditionally used to enforce policies within the enterprise. These include ACLs, VLANs, NATs, policy-routing, and proprietary admission control systems.(More)
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious users who circumvent the client can capitalize on the missing server validation. In this paper, we describe WAPTEC, a tool that is designed to automatically identify parameter(More)
Multimorbidity, the concurrent manifestation or presence of multiple chronic conditions, poses huge challenges to affected patients, their relatives, physicians, and practitioners alike. The growing number of affected persons and the complexity of their needs places just as much of a burden on the health care system as does the plethora of often poorly(More)
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., "credit card expiration date must be valid"). This is typically done for two reasons: to reduce burden on the server and to avoid latencies in communicating with the server. However, when a server fails to replicate the validation(More)
While traditional network security policies have been enforced by manual configuration of individual network components such as router ACLs, firewalls, NATs and VLANs, emerging enterprise network designs and products support global policies declared over high level abstractions [2, 1, 14, 13]. We further the evolution of simpler and more powerful network(More)
In this paper, we describe an approach for automatically generating configurations for complex applications. Automated generation of system co n-figurations is required to allow large-scale deployment of custom applications within utility computin g environments. Our approach models the co nfiguration management problem as an Object-Oriented Constraint(More)
Real-world automated reasoning systems must contend with inconsistencies and the vast amount of information stored in relational databases. In this paper, we introduce compilation techniques for inconsistency-tolerant reasoning over the combination of classical logic and a relational database. Our resolution-based algorithms address a quantifier-free,(More)
Access control schemes come in all shapes and sizes, which makes choosing the right one for a particular application a challenge. Yet today's techniques for comparing access control schemes completely ignore the setting in which the scheme is to be deployed. In this paper, we present a formal framework for comparing access control schemes with respect to a(More)
Modern web forms interact with the user in real-time by detecting errors and filling-in implied values, which in terms of automated reasoning amounts to SAT solving and theorem proving. This paper presents PLATO, a compiler that automatically generates web forms that detect errors and fill-in implied values from declarative web form descriptions. Instead of(More)
Um die körperlicher Aktivität (PA) von Personen im Alter von ≥70 Jahren in epidemiologischen Studien erfassen zu können, fehlt ein geeignetes Messinstrument (Q). Das Ziel der vorliegenden Arbeit war die Entwicklung und Evaluation des Fragebogens PRISCUS-PAQ. Dazu wurden bestehende Aktivitätsfragebögen übersetzt und für Ältere adaptiert. Die Reliabilität des(More)