Sciweavers

21 search results - page 1 / 5
» Formal Approaches to Information-Hiding (Tutorial)
Sort
View
79
Voted
TGC
2007
Springer
15 years 4 months ago
Formal Approaches to Information-Hiding (Tutorial)
Abstract. In this survey paper we consider the class of protocols for informationhiding which use randomization to obfuscate the link between the observables and the information to...
Romain Beauxis, Konstantinos Chatzikokolakis, Catu...
TOPLAS
2002
98views more  TOPLAS 2002»
14 years 9 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson
112
Voted
FMCO
2005
Springer
153views Formal Methods» more  FMCO 2005»
15 years 3 months ago
Smallfoot: Modular Automatic Assertion Checking with Separation Logic
Abstract. Separation logic is a program logic for reasoning about programs that manipulate pointer data structures. We describe Smallfoot, a tool for checking certain lightweight s...
Josh Berdine, Cristiano Calcagno, Peter W. O'Hearn
81
Voted
FUIN
2007
99views more  FUIN 2007»
14 years 10 months ago
Tutorial Examples of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carryingcode provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set o...
Amy P. Felty
85
Voted
RTA
2005
Springer
15 years 3 months ago
A Tutorial Example of the Semantic Approach to Foundational Proof-Carrying Code
Proof-carrying code provides a mechanism for insuring that a host, or code consumer, can safely run code delivered by a code producer. The host specifies a safety policy as a set ...
Amy P. Felty