Sciweavers

890 search results - page 36 / 178
» Programming language methods in computer security
Sort
View
POPL
2004
ACM
16 years 25 days ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
OOPSLA
2001
Springer
15 years 5 months ago
Contract Soundness for Object-Oriented Languages
Checking pre- and post-conditions of procedures and methods at runtime helps improve software reliability. In the procedural world, pre- and post-conditions have a straightforward...
Robert Bruce Findler, Matthias Felleisen
ISF
2008
114views more  ISF 2008»
15 years 16 days ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
89
Voted
APCHI
1998
IEEE
15 years 4 months ago
Cleogo: Collaborative and Multi-Metaphor Programming for Kids
Cleogo is a novel groupware environment that allows several users to simultaneously develop programs through any mixture of three alternative programming metaphors: a direct manip...
Andy Cockburn, Andrew Bryant
LICS
2003
IEEE
15 years 5 months ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi