Sciweavers

1843 search results - page 48 / 369
» Securing Class Initialization
Sort
View
TCS
2008
15 years 1 months ago
Security types for dynamic web data
We describe a type system for the Xd calculus of Gardner and Maffeis. An Xd-network is a network of locations, where each location consists of both a data tree (which contains scr...
Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, J...
SAINT
2009
IEEE
15 years 8 months ago
Understanding the Challenges in Securing Internet Routing
The Internet routing system plays an essential role of glueing together tens of thousands of individual networks to create a global data delivery substrate. Over the years many ef...
Ricardo V. Oliveira, Mohit Lad, Lixia Zhang
IFIP
2007
Springer
15 years 8 months ago
Cyber Security: Are Economic Incentives Adequate?
Protecting national critical infrastructure assets from cyber incidents is an important challenge. One facet of this challenge is that the vast majority of the owners and operators...
Scott Dynes, Eric Goetz, Michael Freeman
IJNSEC
2007
142views more  IJNSEC 2007»
15 years 1 months ago
Java Bytecode Dependence Analysis for Secure Information Flow
Java programs can be transmitted and executed on another host in bytecode format, thus the sensitive information of the host may be leaked via these assembly-like programs. Inform...
Gaowei Bian, Ken Nakayama, Yoshitake Kobayashi, Ma...
ACNS
2004
Springer
131views Cryptology» more  ACNS 2004»
15 years 5 months ago
Evaluating Security of Voting Schemes in the Universal Composability Framework
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting pr...
Jens Groth