Sciweavers

1027 search results - page 90 / 206
» Callgraph properties of executables
Sort
View
121
Voted
CASSIS
2004
Springer
15 years 6 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
107
Voted
MIDDLEWARE
2004
Springer
15 years 6 months ago
NeCoMan: middleware for safe distributed service deployment in programmable networks
Recent evolution in computer networks clearly demonstrates a trend towards complex and dynamic networks. To fully exploit the potential of such heterogeneous and rapidly evolving ...
Nico Janssens, Lieven Desmet, Sam Michiels, Pierre...
PPDP
2004
Springer
15 years 6 months ago
Just enough tabling
We introduce just enough tabling (JET), a mechanism to suspend and resume the tabled execution of logic programs at an arbitrary point. In particular, JET allows pruning of tabled...
Konstantinos F. Sagonas, Peter J. Stuckey
115
Voted
RE
2004
Springer
15 years 6 months ago
Goal-Oriented Requirements Animation
Requirements engineers need to make sure that the requirements models and specifications they are building do accurately capture what stakeholders really want. Requirements animat...
Hung Tran Van, Axel van Lamsweerde, Philippe Masso...
119
Voted
IPPS
2003
IEEE
15 years 6 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...