The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Zdancewic and Myers introduced observational determinism as a scheduler independent notion of security for concurrent programs. This paper proposes a type system for verifying obs...
The act of computer programming is generally considered to be temporally removed from a computer program’s execution. In this paper we discuss the idea of programming as an acti...
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...