Sciweavers

244 search results - page 25 / 49
» Dynamic Dependency Monitoring to Secure Information Flow
Sort
View
AOSD
2009
ACM
15 years 1 months ago
The dataflow pointcut: a formal and practical framework
Some security concerns are sensitive to flow of information in a program execution. The dataflow pointcut has been proposed by Masuhara and Kawauchi in order to easily implement s...
Dima Alhadidi, Amine Boukhtouta, Nadia Belblidia, ...
DLS
2009
196views Languages» more  DLS 2009»
14 years 7 months ago
Contracts for first-class modules
Behavioral software contracts express properties concerning the flow of values across component (modules, classes, etc) interfaces. These properties are often beyond the reach of ...
T. Stephen Strickland, Matthias Felleisen
USS
2008
14 years 12 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
PASTE
2005
ACM
15 years 3 months ago
Low overhead program monitoring and profiling
Program instrumentation, inserted either before or during execution, is rapidly becoming a necessary component of many systems. Instrumentation is commonly used to collect informa...
Naveen Kumar, Bruce R. Childers, Mary Lou Soffa
76
Voted
ICASSP
2008
IEEE
15 years 4 months ago
Mutual information based relevance network analysis: a Parkinson'S disease study
Monitoring the dynamics of networks in the brain is of central importance in normal and disease states. Current methods of detecting networks in the recorded EEG such as correlati...
Pamela Wen-Hsin Lee, Z. Jane Wang, Martin J. McKeo...