Sciweavers

624 search results - page 87 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
DRM
2006
Springer
15 years 3 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
DEXAW
1999
IEEE
102views Database» more  DEXAW 1999»
15 years 4 months ago
NIGELOG: Protecting Logging Information by Hiding Multiple Backups in Directories
This paper proposed a novel method to protect logging information more securely. The method, named NIGELOG, produces multiple backups of the logging information, hides them in arb...
Tetsuji Takada, Hideki Koike
OOPSLA
2004
Springer
15 years 5 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
CAV
2009
Springer
133views Hardware» more  CAV 2009»
16 years 10 days ago
Cardinality Abstraction for Declarative Networking Applications
ity Abstraction for Declarative Networking Applications Juan A. Navarro P?erez, Andrey Rybalchenko, and Atul Singh Max Planck Institute for Software Systems (MPI-SWS) Declarative N...
Andrey Rybalchenko, Atul Singh, Juan Antonio Navar...
AIME
2007
Springer
15 years 6 months ago
Using Semantic Web Technologies for Knowledge-Driven Querying of Biomedical Data
Software applications that work with biomedical data have significant knowledge-management requirements. Formal knowledge models and knowledge-based methods can be very useful in m...
Martin J. O'Connor, Ravi Shankar, Samson W. Tu, Cs...