Sciweavers

1183 search results - page 59 / 237
» On flow-sensitive security types
Sort
View
ICDCS
2008
IEEE
15 years 11 months ago
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs
Null data frames are a special but important type of frames in IEEE 802.11 based Wireless Local Area Networks (e.g., 802.11 WLANs). They are widely used for power management, chan...
Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia...
DAGSTUHL
2001
15 years 5 months ago
A Language-Based Approach to Security
Abstract. Language-based security leverages program analysis and program rewriting to enforce security policies. The approach promises efficient enforcement of fine-grained access ...
Fred B. Schneider, J. Gregory Morrisett, Robert Ha...
OZCHI
2005
ACM
15 years 10 months ago
Spy-resistant keyboard: more secure password entry on public touch screen displays
Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. These techniques are poor for entering priv...
Desney S. Tan, Pedram Keyani, Mary Czerwinski
CASSIS
2004
Springer
15 years 10 months ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann
LISA
2004
15 years 5 months ago
Making a Game of Network Security
This paper describes our experiences in the design and implementation of a network for security training exercises, and one such exercise. The network described herein is flexible...
Marc Dougherty