Sciweavers

890 search results - page 37 / 178
» Programming language methods in computer security
Sort
View
91
Voted
ASPLOS
2008
ACM
15 years 2 months ago
Parallelizing security checks on commodity hardware
Speck1 is a system that accelerates powerful security checks on commodity hardware by executing them in parallel on multiple cores. Speck provides an infrastructure that allows se...
Edmund B. Nightingale, Daniel Peek, Peter M. Chen,...
85
Voted
SAC
2004
ACM
15 years 5 months ago
Using mobile agents as roaming security guards to test and improve security of hosts and networks
1 This paper discusses the design and implementation details of MAST (Mobile Agent-based Security Tool), a new mobile agentbased network security approach. MAST has been designed t...
Marco M. Carvalho, Thomas B. Cowin, Niranjan Suri,...
110
Voted
SPLST
2003
15 years 1 months ago
Secure SMS messaging using Quasigroup encryption and Java SMS API
SMS (Short Message Service) is a widely used service for brief communication. Occasionally the data sent using SMS services is confidential in nature and is desired not to be disc...
Marko Hassinen, Smile Markovski
102
Voted
IFL
1997
Springer
153views Formal Methods» more  IFL 1997»
15 years 4 months ago
Common Subexpressions Are Uncommon in Lazy Functional Languages
Common subexpression elimination is a well-known compiler optimisation that saves time by avoiding the repetition of the same computation. In lazy functional languages, referential...
Olaf Chitil
81
Voted
IFIP
2009
Springer
15 years 7 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii