Sciweavers

4731 search results - page 28 / 947
» Securing Interactive Programs
Sort
View
JAVA
1999
Springer
15 years 1 months ago
The Operational Semantics of a Java Secure Processor
Pieter H. Hartel, Michael J. Butler, Moshe Levy
IFIP
2010
Springer
14 years 4 months ago
Security Analysis of the MPLS Label Distribution Protocol
Daniel Guernsey, Aaron Engel, Jonathan Butts, Suje...
75
Voted
CCS
2009
ACM
15 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ICFP
2000
ACM
15 years 2 months ago
Static enforcement of security with types
A number of security systems for programming languages have recently appeared, including systems for enforcing some form of ac
Christian Skalka, Scott F. Smith
88
Voted
WWW
2009
ACM
15 years 10 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang