Sciweavers

5790 search results - page 613 / 1158
» Distributed programming with distributed authorization
Sort
View
ESORICS
2010
Springer
15 years 6 months ago
On Bounding Problems of Quantitative Information Flow
Abstract. Researchers have proposed formal definitions of quantitative information flow based on information theoretic notions such as the Shannon entropy, the min entropy, the gue...
Hirotoshi Yasuoka, Tachio Terauchi
CONCURRENCY
1998
181views more  CONCURRENCY 1998»
15 years 4 months ago
Communication Performance of Java-Based Parallel Virtual Machines
Message passing libraries such as Parallel Virtual Machine PVM and Message Passing Interface MPI provide a common Application Programming Interface API to implement parallel...
Narendar Yalamanchilli, William W. Cohen
CCS
2010
ACM
15 years 3 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
15 years 2 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
POPL
2009
ACM
16 years 5 months ago
Compositional shape analysis by means of bi-abduction
This paper describes a compositional shape analysis, where each procedure is analyzed independently of its callers. The analysis uses an abstract domain based on a restricted frag...
Cristiano Calcagno, Dino Distefano, Peter W. O'Hea...