Sciweavers

1599 search results - page 165 / 320
» Program Analysis for Security and Privacy
Sort
View
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 8 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
SAFECOMP
1999
Springer
15 years 8 months ago
Formal Design of Distributed Control Systems with Lustre
During the last decade, the synchronous approach has proved to meet industrial needs concerning the development of Distributed Control Systems (DCS): as an example, Schneider Elect...
Paul Caspi, Christine Mazuet, Rym Salem, Daniel We...
OOPSLA
1997
Springer
15 years 8 months ago
Class Hierarchy Specialization
Class libraries are generally designed with an emphasis on versatility and extensibility. Applications that use a library typically exercise only part of the library’s functiona...
Frank Tip, Peter F. Sweeney
OOPSLA
1990
Springer
15 years 8 months ago
A Framework for Visualizing Object-Oriented Systems
This paper describes a new approach to visualizing program systems within the object-oriented paradigm. This approach is based on a TEX-like notation which has been extended and g...
Volker Haarslev, Ralf Möller
CSFW
2010
IEEE
15 years 8 months ago
Information Flow Monitor Inlining
In recent years it has been shown that dynamic monitoring can be used to soundly enforce information flow policies. For programs distributed in source or bytecode form, the use o...
Andrey Chudnov, David A. Naumann