Sciweavers

447 search results - page 75 / 90
» Rule Languages for Security and Privacy in Cooperative Syste...
Sort
View
CCS
2008
ACM
15 years 1 months ago
When good instructions go bad: generalizing return-oriented programming to RISC
This paper reconsiders the threat posed by Shacham's "return-oriented programming" -- a technique by which WX-style hardware protections are evaded via carefully cr...
Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan ...
OOPSLA
2010
Springer
14 years 10 months ago
Cross-language, type-safe, and transparent object sharing for co-located managed runtimes
As software becomes increasingly complex and difficult to analyze, it is more and more common for developers to use high-level, type-safe, object-oriented (OO) programming langua...
Michal Wegiel, Chandra Krintz
ACSAC
2002
IEEE
15 years 4 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
RML
2002
140views Business» more  RML 2002»
14 years 11 months ago
UML as knowledge acquisition frontend for Semantic Web configuration knowledge bases
The trend towards highly specialized solution providers cooperatively offering configurable products and services to their customers requires the extension of current (standalone)...
Alexander Felfernig, Gerhard Friedrich, Dietmar Ja...
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 6 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright