This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security ...
David P. Gilliam, John D. Powell, Matt Bishop, Chr...
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Abstract. Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usabi...
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...