Sciweavers

1599 search results - page 46 / 320
» Program Analysis for Security and Privacy
Sort
View
OOPSLA
1995
Springer
15 years 5 months ago
Using a Prototype-based Language for User Interface: The Newton Project's Experience
Object-oriented user interface frameworks are usually implemented in a class-based language. We chose instead to develop a prototype-based language, NewtonScript, for this purpose...
Walter R. Smith
ACSAC
1999
IEEE
15 years 6 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
CCS
2004
ACM
15 years 7 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
FOSAD
2009
Springer
15 years 8 months ago
Logic in Access Control (Tutorial Notes)
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and t...
Martín Abadi
SP
2000
IEEE
15 years 5 months ago
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
Tradeoffs are an important part of engineering security. Protocol security is important. So are efficiency and cost. This paper provides an early framework for handling such aspec...
John A. Clark, Jeremy L. Jacob