Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
We evaluate the anonymity provided by two popular email mix implementations, Mixmaster and Reliable, and compare their effectiveness through the use of simulations which model th...