Sciweavers

1599 search results - page 34 / 320
» Program Analysis for Security and Privacy
Sort
View
SP
2008
IEEE
195views Security Privacy» more  SP 2008»
15 years 8 months ago
Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage
We study formal security properties of a state-of-the-art protocol for secure file sharing on untrusted storage, in the automatic protocol verifier ProVerif. As far as we know, ...
Bruno Blanchet, Avik Chaudhuri
WISA
2004
Springer
15 years 7 months ago
A Probabilistic Method for Detecting Anomalous Program Behavior
In this paper, we, as well as Eskin, Lee, Stolfo [7] propose a method of prediction model. In their method, the program was characterized with both the order and the kind of system...
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
117
Voted
ESORICS
2004
Springer
15 years 7 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
OOPSLA
1990
Springer
15 years 6 months ago
Type Substitution for Object-Oriented Programming
Genericity allows the substitution of types in a class. This is usually obtained through parameterized classes, although they are inflexible since any class can be inherited but i...
Jens Palsberg, Michael I. Schwartzbach
OOPSLA
1991
Springer
15 years 5 months ago
Developing a GUIDE Using Object-Oriented Programming
PICASSOis a graphical user interface development environment built using the Common Lisp Object System (CLOS). This paper describes how CLOS features including multiple inheritanc...
Joseph A. Konstan, Lawrence A. Rowe