Sciweavers

1599 search results - page 66 / 320
» Program Analysis for Security and Privacy
Sort
View
122
Voted
TRUSTBUS
2009
Springer
15 years 10 months ago
Operational Semantics for DKAL: Application and Analysis
DKAL is a new expressive high-level authorization language. It has been successfully tried at Microsoft which led to further improvements of the language itself. One improvement is...
Yuri Gurevich, Arnab Roy
ISI
2006
Springer
15 years 3 months ago
Strategic Intelligence Analysis: From Information Processing to Meaning-Making
Strategic intelligence involves the efforts to understand the "Big Picture" emerging from data sources. Concerning textual data, this process involves the extraction of m...
Yair Neuman, Liran Elihay, Meni Adler, Yoav Goldbe...
113
Voted
LICS
1999
IEEE
15 years 8 months ago
Non-Deterministic Games and Program Analysis: An Application to Security
Pasquale Malacaria, Chris Hankin
148
Voted
INFOCOM
2011
IEEE
14 years 7 months ago
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
—Receiver-location privacy is an important security requirement in privacy-preserving Vehicular Ad hoc Networks (VANETs), yet the unavailable receiver’s location information ma...
Xiaodong Lin, Rongxing Lu, Xiaohui Liang, Xuemin S...