Sciweavers

519 search results - page 26 / 104
» How to make secure email easier to use
Sort
View
CRITIS
2007
14 years 11 months ago
Ideal Based Cyber Security Technical Metrics for Control Systems
Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provid...
Wayne F. Boyer, Miles A. McQueen
OOPSLA
2007
Springer
15 years 3 months ago
Lost in translation: formalizing proposed extensions to c#
Current real-world software applications typically involve heavy use of relational and XML data and their query languages. Unfortunately object-oriented languages and database que...
Gavin M. Bierman, Erik Meijer, Mads Torgersen
OOPSLA
2004
Springer
15 years 3 months ago
Event-driven programming facilitates learning standard programming concepts
We have designed a CS 1 course that integrates event-driven programming from the very start. In [2] we argued that event-driven programming is simple enough for CS 1 when introduc...
Kim B. Bruce, Andrea Pohoreckyj Danyluk
ACSAC
2007
IEEE
15 years 4 months ago
Automated Security Debugging Using Program Structural Constraints
Understanding security bugs in a vulnerable program is a non-trivial task, even if the target program is known to be vulnerable. Though there exist debugging tools that facilitate...
Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan...
74
Voted
INFOCOM
2008
IEEE
15 years 4 months ago
A New Perspective on Internet Security using Insurance
—Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods (such as firewalls, intrusion dete...
Jean-Chrysostome Bolot, Marc Lelarge