Sciweavers

1183 search results - page 16 / 237
» On flow-sensitive security types
Sort
View
DIMVA
2006
15 years 5 months ago
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs
Incomplete or improper input validation is one of the major sources of security bugs in programs. While traditional approaches often focus on detecting string related buffer overfl...
Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Kar...
127
Voted
HICSS
2002
IEEE
132views Biometrics» more  HICSS 2002»
15 years 9 months ago
Secure Transmission of the Prescription Order Communication System Based on the Internet and the Public-Key Infrastructure Using
This research paper presents a new system's design and development of the prescription order communication system (POCS) based on the Internet between the hospital and the ph...
Won Jay Song, Byung-Ha Ahn
CSFW
2008
IEEE
15 years 10 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
VMCAI
2004
Springer
15 years 9 months ago
Security Types Preserving Compilation: (Extended Abstract)
Gilles Barthe, Amitabh Basu, Tamara Rezk