Sciweavers

1599 search results - page 24 / 320
» Program Analysis for Security and Privacy
Sort
View
128
Voted
ICIP
2010
IEEE
15 years 1 months ago
Security analysis for privacy preserving search of multimedia
With the increasing popularity of digital multimedia such as images and videos and the advent of the cloud computing paradigm, a fast growing amount of private and sensitive multi...
Wenjun Lu, Avinash L. Varna, Min Wu
153
Voted
CCS
2008
ACM
15 years 5 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...
OOPSLA
2005
Springer
15 years 9 months ago
Runtime specialization with optimistic heap analysis
Ajeet Shankar, S. Subramanya Sastry, Rastislav Bod...
150
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Security Usability Principles for Vulnerability Analysis and Risk Assessment
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
Audun Jøsang, Bander AlFayyadh, Tyrone Gran...
114
Voted
CCS
2003
ACM
15 years 8 months ago
Formal access control analysis in the software development process
Security is a crucial aspect in any modern software system. To ensure security in the final product, security requirements must be considered in the entire software development p...
Manuel Koch, Francesco Parisi-Presicce