Sciweavers

1599 search results - page 191 / 320
» Program Analysis for Security and Privacy
Sort
View
TACAS
2010
Springer
245views Algorithms» more  TACAS 2010»
15 years 11 months ago
Stranger: An Automata-Based String Analysis Tool for PHP
STRANGER is an automata-based string analysis tool for finding and eliminating string-related security vulnerabilities in PHP applications. STRANGER uses symbolic forward and back...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
OOPSLA
2007
Springer
15 years 10 months ago
Compile-time execution structure of object-oriented programs with practical ownership domain annotations
Ownership domain annotations express and enforce design intent related to object encapsulation and communication directly in real object-oriented code. First, this work will make ...
Marwan Abi-Antoun
OOPSLA
2005
Springer
15 years 10 months ago
Io: a small programming language
Io is small prototype-based programming language. The ideas in Io are mostly inspired by Smalltalk[1] (all values are objects), Self[2] (prototype-based), NewtonScript[3] (differe...
Steve Dekorte
ACISP
2006
Springer
15 years 10 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
CCS
2006
ACM
15 years 8 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang