Sciweavers

4731 search results - page 8 / 947
» Securing Interactive Programs
Sort
View
IFIP
2010
Springer
14 years 6 months ago
Secure Upgrade of Hardware Security Modules in Bank Networks
Riccardo Focardi, Flaminia L. Luccio
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
15 years 6 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore
POPL
2001
ACM
16 years 1 days ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
DSN
2000
IEEE
15 years 4 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
OOPSLA
2009
Springer
15 years 6 months ago
Concurrency by default: using permissions to express dataflow in stateful programs
Sven Stork, Paulo Marques, Jonathan Aldrich