305
click to vote
CASSIS
15 years 10 months ago
2005 Springer
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
116
click to vote
CASSIS
15 years 10 months ago
2005 Springer
Memory is one of the scarcest resource of embedded and constrained devices. This paper studies the memory footprint benefit of pre-deploying embedded Java systems up to their acti...
129
Voted
CASSIS
15 years 10 months ago
2005 Springer
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
158
click to vote
CASSIS
15 years 10 months ago
2005 Springer
System software for deeply embedded devices has to cope with a broad variety of requirements and platforms, but especially with strict resource constraints. To compete against prop...
134
click to vote
CASSIS
15 years 10 months ago
2005 Springer
Abstract. Abstract interpretation is a particularly well-suited methodology to build modular correctness proof of static analysers. Proof modularity becomes essential when correctn...
|