Sciweavers

4731 search results - page 8 / 947
» Securing Interactive Programs
Sort
View
76
Voted
IFIP
2010
Springer
14 years 9 months ago
Secure Upgrade of Hardware Security Modules in Bank Networks
Riccardo Focardi, Flaminia L. Luccio
95
Voted
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 8 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
248
Voted
POPL
2001
ACM
16 years 2 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
DSN
2000
IEEE
15 years 6 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
94
Voted
OOPSLA
2009
Springer
15 years 8 months ago
Concurrency by default: using permissions to express dataflow in stateful programs
Sven Stork, Paulo Marques, Jonathan Aldrich