Sciweavers

181 search results - page 23 / 37
» A Mechanism for Verifying Data Speculation
Sort
View
CGO
2005
IEEE
15 years 5 months ago
Building Intrusion-Tolerant Secure Software
In this work, we develop a secret sharing based compiler solution to achieve confidentiality, integrity and availability (intrusion tolerance) of critical data together, rather th...
Tao Zhang, Xiaotong Zhuang, Santosh Pande
IPSN
2005
Springer
15 years 5 months ago
Rope: robust position estimation in wireless sensor networks
— We address the problem of secure location determination, known as Secure Localization, and the problem of verifying the location claim of a node, known as Location Verificatio...
Loukas Lazos, Radha Poovendran, Srdjan Capkun
BIRTHDAY
2006
Springer
15 years 3 months ago
Refinement-Based Verification for Possibly-Cyclic Lists
In earlier work, we presented an abstraction-refinement mechanism that was successful in verifying automatically the partial correctness of in-situ list reversal when applied to an...
Alexey Loginov, Thomas W. Reps, Mooly Sagiv
PVLDB
2008
101views more  PVLDB 2008»
14 years 11 months ago
Output perturbation with query relaxation
Given a dataset containing sensitive personal information, a statistical database answers aggregate queries in a manner that preserves individual privacy. We consider the problem ...
Xiaokui Xiao, Yufei Tao
JLP
2010
142views more  JLP 2010»
14 years 6 months ago
Relational bytecode correlations
We present a calculus for tracking equality relationships between values through pairs of bytecode programs. The calculus may serve as a certification mechanism for noninterferenc...
Lennart Beringer