Sciweavers

2257 search results - page 165 / 452
» Secure program partitioning
Sort
View
OOPSLA
2009
Springer
15 years 11 months ago
Language factories
Programming languages are the primary mechanism by which software is created, yet most of us have access to only a few, fixed, programming languages. Any problem we wish to expre...
Tony Clark, Laurence Tratt
RSP
2007
IEEE
141views Control Systems» more  RSP 2007»
15 years 11 months ago
Rapid Prototyping of Intrusion Detection Systems
Designing security softwares that evolve as quickly as threats is a truthful challenge. In addition, current software becomes increasingly more complex and difficult to handle ev...
Fabrice Kordon, Jean-Baptiste Voron
150
Voted
CSFW
1997
IEEE
15 years 9 months ago
Eliminating Covert Flows with Minimum Typings
A type system is given that eliminates two kinds of covert flows in an imperative programming language. The first kind arises from nontermination and the other from partial oper...
Dennis M. Volpano, Geoffrey Smith
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
16 years 2 days ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
158
Voted
LICS
2003
IEEE
15 years 10 months ago
Logic in Access Control
Access control is central to security in computer systems. Over the years, there have been many efforts to explain and to improve access control, sometimes with logical ideas and ...
Martín Abadi