Sciweavers

2236 search results - page 149 / 448
» Secure Software Design in Practice
Sort
View
CCS
2010
ACM
15 years 3 months ago
A control point for reducing root abuse of file-system privileges
We address the problem of restricting root’s ability to change arbitrary files on disk, in order to prevent abuse on most current desktop operating systems. The approach first...
Glenn Wurster, Paul C. van Oorschot
144
Voted
DLOG
2004
15 years 5 months ago
Extended Query Facilities for Racer and an Application to Software-Engineering Problems
er reports on a pragmatic query language for Racer. The abstract syntax and semantics of this query language is defined. Next, the practical relevance of this query language is sh...
Volker Haarslev, Ralf Möller, Ragnhild Van De...
PKC
2009
Springer
164views Cryptology» more  PKC 2009»
16 years 4 months ago
Asynchronous Multiparty Computation: Theory and Implementation
Abstract. We propose an asynchronous protocol for general multiparty computation with perfect security and communication complexity O(n2 |C|k) where n is the number of parties, |C|...
Ivan Damgård, Jesper Buus Nielsen, Martin Ge...
169
Voted
IFIPTM
2009
119views Management» more  IFIPTM 2009»
15 years 1 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
WCRE
2009
IEEE
15 years 11 months ago
An Exploratory Study of the Impact of Code Smells on Software Change-proneness
—Code smells are poor implementation choices, thought to make object-oriented systems hard to maintain. In this study, we investigate if classes with code smells are more change-...
Foutse Khomh, Massimiliano Di Penta, Yann-Gaë...