Sciweavers

187 search results - page 17 / 38
» Secure information flow and program logics
Sort
View
CORR
2006
Springer
105views Education» more  CORR 2006»
14 years 9 months ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
SIGSOFT
2006
ACM
15 years 10 months ago
Testing context-aware middleware-centric programs: a data flow approach and an RFID-based experimentation
Pervasive context-aware software is an emerging kind of application. Smart personal digital assistants and RFID-based location sensing software are two examples. Many of these sys...
Heng Lu, W. K. Chan, T. H. Tse
IFIP
2009
Springer
15 years 4 months ago
Static Detection of Logic Flaws in Service-Oriented Applications
Application or business logic, used in the development of services, has to do with the operations that define the application functionalities and not with the platform ones. Often...
Chiara Bodei, Linda Brodo, Roberto Bruni
CADE
2008
Springer
15 years 9 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
PLDI
2009
ACM
15 years 4 months ago
Staged information flow for javascript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that executes in client browsers. A common paradigm in such websites is to include third-party Ja...
Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sori...