Sciweavers

1599 search results - page 80 / 320
» Program Analysis for Security and Privacy
Sort
View
AGENTS
2000
Springer
15 years 8 months ago
Air traffic control and alert agent
This paper presents an agent program that monitors and interacts with the dynamic situation of flights around an airport tower as well as interacts with a human operator that can ...
Henry Hexmoor, Tim Heng
118
Voted
OOPSLA
1998
Springer
15 years 8 months ago
Data Groups: Specifying the Modification of Extended State
This paper explores the interpretation of specifications in the context of an object-oriented programming language with subclassing and method overrides. In particular, the paper ...
K. Rustan M. Leino
CSFW
1998
IEEE
15 years 7 months ago
Probabilistic Noninterference in a Concurrent Language
In previous work [16], we give a type system that guarantees that well-typed multithreaded programs are possibilistically noninterfering. If thread scheduling is probabilistic, ho...
Dennis M. Volpano, Geoffrey Smith
SAFECOMP
2009
Springer
15 years 8 months ago
A Foundation for Requirements Analysis of Dependable Software
We present patterns for expressing dependability requirements, such as confidentiality, integrity, availability, and reliability. The paper considers random faults as well as cert...
Denis Hatebur, Maritta Heisel
125
Voted
CCS
2007
ACM
15 years 10 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...