Sciweavers

1843 search results - page 95 / 369
» Securing Class Initialization
Sort
View
144
Voted
ATVA
2010
Springer
163views Hardware» more  ATVA 2010»
15 years 4 months ago
Automatic Generation of History-Based Access Control from Information Flow Specification
This paper proposes a method for automatically inserting check statements for access control into a given recursive program according to a given security specification. A history-b...
Yoshiaki Takata, Hiroyuki Seki
122
Voted
CCS
2010
ACM
15 years 4 months ago
Predictive black-box mitigation of timing channels
We investigate techniques for general black-box mitigation of timing channels. The source of events is wrapped by a timing mitigator that delays output events so that they contain...
Aslan Askarov, Danfeng Zhang, Andrew C. Myers
IEICET
2008
113views more  IEICET 2008»
15 years 4 months ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...
OOPSLA
1999
Springer
15 years 9 months ago
Practical Experience with an Application Extractor for Java
Java programs are routinely transmitted over low-bandwidth network connections as compressed class le archives (i.e., zip les and jar les). Since archive size is directly proporti...
Frank Tip, Chris Laffra, Peter F. Sweeney, David S...
JCSS
2006
102views more  JCSS 2006»
15 years 4 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh