Sciweavers

1210 search results - page 162 / 242
» Secure Logic Synthesis
Sort
View
144
Voted
POPL
2012
ACM
13 years 11 months ago
Towards a program logic for JavaScript
JavaScript has become the most widely used language for clientside web programming. The dynamic nature of JavaScript makes understanding its code notoriously difficult, leading t...
Philippa Gardner, Sergio Maffeis, Gareth David Smi...
JAR
2000
145views more  JAR 2000»
15 years 3 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
142
Voted
COMPSEC
2008
111views more  COMPSEC 2008»
15 years 3 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
145
Voted
SACMAT
2009
ACM
15 years 10 months ago
A decision support system for secure information sharing
In both the commercial and defense sectors a compelling need is emerging for highly dynamic, yet risk optimized, sharing of information across traditional organizational boundarie...
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi,...
140
Voted
SIGADA
2004
Springer
15 years 9 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton