Sciweavers

1599 search results - page 11 / 320
» Program Analysis for Security and Privacy
Sort
View
99
Voted
PAISI
2010
Springer
15 years 7 days ago
An Association Model for Implicit Crime Link Analysis
Jau-Hwang Wang, Chien-Lung Lin
94
Voted
OOPSLA
2010
Springer
14 years 11 months ago
Patterns and statistical analysis for understanding reduced resource computing
Martin C. Rinard, Henry Hoffmann, Sasa Misailovic,...
ESORICS
2010
Springer
15 years 2 months ago
Flexible Scheduler-Independent Security
Abstract We propose an approach to certify the information flow security of multi-threaded programs independently from the scheduling algorithm. A scheduler-independent verificatio...
Heiko Mantel, Henning Sudbrock
167
Voted
POPL
2012
ACM
13 years 9 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...