Sciweavers

92 search results - page 17 / 19
» Secure Information Flow as a Safety Problem
Sort
View
SACMAT
2006
ACM
15 years 3 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
NOMS
2002
IEEE
15 years 2 months ago
Message tracking in SOAP-based Web services
As web services become more prevalent, the nature of electronic transactions on the Internet changes from simple browser-to-business clicks to an orchestrated flow of messages bet...
Akhil Sahai, Vijay Machiraju, Jinsong Ouyang, Klau...
SP
2010
IEEE
327views Security Privacy» more  SP 2010»
15 years 1 months ago
Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow
– With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a desktop application, a web application is split...
Shuo Chen, Rui Wang, XiaoFeng Wang, Kehuan Zhang
SACMAT
2009
ACM
15 years 4 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
SIGSOFT
2004
ACM
15 years 10 months ago
PSE: explaining program failures via postmortem static analysis
In this paper, we describe PSE (Postmortem Symbolic Evaluation), a static analysis algorithm that can be used by programmers to diagnose software failures. The algorithm requires ...
Roman Manevich, Manu Sridharan, Stephen Adams, Man...