Sciweavers

1599 search results - page 48 / 320
» Program Analysis for Security and Privacy
Sort
View
OOPSLA
1993
Springer
15 years 6 months ago
Object Fault Handling for Persistent Programming Languages: A Performance Evaluation
A key mechanism of a persistent programming language is its ability to detect and handle references to non-resident objects. Ideally, this mechanism should be hidden from the prog...
Antony L. Hosking, J. Eliot B. Moss
104
Voted
ESORICS
2007
Springer
15 years 8 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...
ESORICS
2002
Springer
16 years 1 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
ACSAC
2002
IEEE
15 years 7 months ago
A Toolkit for Detecting and Analyzing Malicious Software
In this paper we present PEAT: The Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to ex...
Michael Weber, Matthew Schmid, Michael Schatz, Dav...
122
Voted
MONET
2010
148views more  MONET 2010»
15 years 11 days ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen