Sciweavers

1599 search results - page 48 / 320
» Program Analysis for Security and Privacy
Sort
View
152
Voted
OOPSLA
1993
Springer
15 years 7 months ago
Object Fault Handling for Persistent Programming Languages: A Performance Evaluation
A key mechanism of a persistent programming language is its ability to detect and handle references to non-resident objects. Ideally, this mechanism should be hidden from the prog...
Antony L. Hosking, J. Eliot B. Moss
118
Voted
ESORICS
2007
Springer
15 years 9 months ago
Obligations and Their Interaction with Programs
Obligations are pervasive in modern systems, often linked to access control decisions. We present a very general model of obligations as objects with state, and discuss its interac...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...
157
Voted
ESORICS
2002
Springer
16 years 3 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...
139
Voted
ACSAC
2002
IEEE
15 years 8 months ago
A Toolkit for Detecting and Analyzing Malicious Software
In this paper we present PEAT: The Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to ex...
Michael Weber, Matthew Schmid, Michael Schatz, Dav...
136
Voted
MONET
2010
148views more  MONET 2010»
15 years 2 months ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen