Sciweavers

4731 search results - page 73 / 947
» Securing Interactive Programs
Sort
View
CC
2005
Springer
15 years 7 months ago
A Compiler-Based Approach to Data Security
Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richar...
122
Voted
OOPSLA
2009
Springer
15 years 8 months ago
Enhancing source-level programming tools with an awareness of transparent program transformations
Programs written in managed languages are compiled to a platform-independent intermediate representation, such as Java bytecode. The relative high level of Java bytecode has engen...
Myoungkyu Song, Eli Tilevich
235
Voted
POPL
2005
ACM
16 years 2 months ago
Downgrading policies and relaxed noninterference
In traditional information-flow type systems, the security policy is often formalized as noninterference properties. However, noninterference alone is too strong to express securi...
Peng Li, Steve Zdancewic
125
Voted
IPCCC
2007
IEEE
15 years 8 months ago
Towards Survivable and Secure Wireless Sensor Networks
– In this paper, we present a comprehensive study on the design of secure and survivable wireless sensor networks (WSNs). Our goal is to develop a framework that provides both se...
Yi Qian, Kejie Lu, David Tipper
114
Voted
WISA
2004
Springer
15 years 7 months ago
A Probabilistic Method for Detecting Anomalous Program Behavior
In this paper, we, as well as Eskin, Lee, Stolfo [7] propose a method of prediction model. In their method, the program was characterized with both the order and the kind of system...
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai