Sciweavers

2517 search results - page 159 / 504
» Secure Deployment of Components
Sort
View
152
Voted
ENTCS
2007
140views more  ENTCS 2007»
15 years 3 months ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...
118
Voted
TCS
2010
15 years 2 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
142
Voted
OOPSLA
1989
Springer
15 years 7 months ago
PCLOS: A Critical Review
This paper uses the persistent object system PCLOS to survey some problems and bene ts of object persistence. The system is analyzed along several relevant dimensions. PCLOS provi...
Andreas Paepcke
IPL
2011
130views more  IPL 2011»
14 years 10 months ago
On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers
Fugue is an intriguing hash function design with a novel shift-register based compression structure and has formal security proofs e.g. against collision attacks. In this paper, w...
Jean-Philippe Aumasson, Raphael C.-W. Phan
OOPSLA
2004
Springer
15 years 9 months ago
RUBiS revisited: why J2EE benchmarking is hard
We have replicated the experiments of Cecchet et al. detailed in ”Performance and Scalability of EJB Applications” at OOPSLA ’02. We report on our experiences configuring, ...
William Pugh, Jaime Spacco