Sciweavers

4731 search results - page 218 / 947
» Securing Interactive Programs
Sort
View
CCS
2008
ACM
15 years 4 months ago
Mechanisms for usage control
Usage control is a generalization of access control that also addresses how data is used after it is released. We present a formal model for different mechanisms that can enforce ...
Alexander Pretschner, Manuel Hilty, David A. Basin...
101
Voted
SIGSOFT
2007
ACM
16 years 3 months ago
Test suite prioritization by interaction coverage
Event-driven software (EDS) is a widely used class of software that takes sequences of events as input, changes state, and outputs new event sequences. Managing the size of tests ...
Renée C. Bryce, Atif M. Memon
ESORICS
2008
Springer
15 years 4 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...
IACR
2011
104views more  IACR 2011»
14 years 2 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...
130
Voted
VL
2008
IEEE
122views Visual Languages» more  VL 2008»
15 years 8 months ago
Designers' natural descriptions of interactive behaviors
While a designer’s focus used to be the design of non-interactive elements such as graphics or animations, today’s designers deal with various levels of interactivity such as ...
Sun Young Park, Brad A. Myers, Andrew J. Ko