Sciweavers

54 search results - page 11 / 11
» Permission accounting in separation logic
Sort
View
POPL
2007
ACM
14 years 6 months ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
SIGMOD
2008
ACM
95views Database» more  SIGMOD 2008»
14 years 5 months ago
Interactive generation of integrated schemas
Schema integration is the problem of creating a unified target schema based on a set of existing source schemas that relate to each other via specified correspondences. The unifie...
Laura Chiticariu, Phokion G. Kolaitis, Lucian Popa
CCS
2007
ACM
13 years 11 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
ARGMAS
2004
Springer
13 years 11 months ago
Revising Beliefs Through Arguments: Bridging the Gap Between Argumentation and Belief Revision in MAS
This paper compares within the MAS framework two separate threads in the formal study of epistemic change: belief revision and argumentation theories. Belief revision describes how...
Fabio Paglieri, Cristiano Castelfranchi